SlideShare a Scribd company logo
Network Sniffers
Privacy Protection
Thamer Alsuhbani
Mikel Solabarrieta
We are going talk about
How do computers communicate in a LAN?
How can we avoid be a victim?
What is a Network Sniffer?
Which are the risks of being monitored?
Sniffers in Wired and Wireless Networks
Conclusions
How do computers communicate in a LAN?
-- A local area network (LAN) is a computer network that interconnects computers within a limited area --
General Idea
-- Sometimes things are not as we expected --
What is a Network Sniffer?
-- A network sniffer monitors data flowing over computer network links in real time. --
What is a Network Sniffer?
Sniffer mode
-- Network adapters have differents operation modes --
How can be this possible?
>> non-promiscuous mode
>> promiscuous mode
>> monitor mode
-- If the package is not for this device drop it --
-- If the package is not for this device do not worry allow it in --
-- Just for wireless, it will capture everything in the “air” --
remember, at this point network adapters are filtering
package using MAC address (LAYER2)
-- Network adapters have differents operation modes --
How can be this possible?
>> promiscuous mode
Wired + Hub - do receive everything (broadcast, unicast and multicast packages, we really meant everything)
*Wireless - it should receive everything on a network to which you have associated (broadcast, unicast and multicast packages, we really meant everything)
Wired + Switch - do not receive everything (broadcast, unicast and multicast packages, that were send to this device)
* it sometimes works, but it depends of the network adapters drivers
-- Network adapters have differents operation modes --
How can be this possible?
>> monitor mode
Wireless - it must receive everything in the air (having in count, frequency, signal strength, channel, etc.)
remember, we are sniffing the “air”, we are going to collect everything of every
network (SSID) around, we do not need to be joined to one of them at all
Sniffers in Wired and Wireless Networks
Hub-based network
-- In a hub, a frame is passed along or "broadcast" to every one of its ports --
Uncleverdevice
-- broadcasting the same data out of each of its ports --
Sniffers in Wired and Wireless Networks
Switch-based network
-- In a switch, a frame is passed to only one or multiple devices that need to receive it --
Smartdevice
-- each port have a device and the switch will send the package directly to a port --
Sniffers in Wired and Wireless Networks
Access point-based network
-- In wireless networks the communication going through the air using radio communication techniques--
-- The air is the way and we can sniff the air--
Which are the risks of being monitored?
FTP
-- Some protocols were designed to manipulate data in plain text --
TELNET
SMTP
HTTP
POP3
IMAPv4
SNMP
plain text
SFTP
HTTPS*
encrypted
SMTPS*
SSH
*S
This is for SSL or TLS
Which are the risks of being monitored? plain text - http
Which are the risks of being monitored? plain text - ftp
How can we avoid be a victim? no longer plain text- sftp
How can we avoid be a victim? no longer plain text- https
How can we avoid be a victim?
-- We should follow good practices when we are surfing on internet --
-- We should avoid using old and insecure known protocols --
Can I sniff someone else wifi?
Is this illegal?
Thanks
Questions

More Related Content

PPTX
Wireless hacking
PPTX
Wireless hacking
PPT
How to hack wireless internet connections
PPT
Hack wireless internet connections or wifi
PPTX
Kismet
PPTX
WiFi Hotspot-Wireless Router
PPT
How To Hack Wireless Internet Connections
ODP
IoT transport protocols
Wireless hacking
Wireless hacking
How to hack wireless internet connections
Hack wireless internet connections or wifi
Kismet
WiFi Hotspot-Wireless Router
How To Hack Wireless Internet Connections
IoT transport protocols

What's hot (19)

PPTX
WLAN SECURITY BY SAIKIRAN PANJALA
PPTX
Wireless Security
PDF
Portable wireless MESH network node
PPTX
Wardriving & Kismet Introduction
PPTX
PPTX
Wirless Security By Zohaib Zeeshan
DOC
St5801 a specification
PPT
Wlan networking and security
PPT
Wlan security
PPTX
Webinar how to prepare for the sunset of 2G and 3G cellular communications
DOCX
ออกแบบระบบเครือข่ายคอมเตอร์อาคาร3ชั้น
PPTX
Wireless LAN Security by Arpit Bhatia
PPTX
Home networking with zig bee
PPTX
Accessing remote networks
PPTX
Wireless LAN Security
PPTX
Wlan security
PDF
LoRaWAN What is it good for - Mark Stanley, Mike Beardmore
PDF
Wireless Lan Security
WLAN SECURITY BY SAIKIRAN PANJALA
Wireless Security
Portable wireless MESH network node
Wardriving & Kismet Introduction
Wirless Security By Zohaib Zeeshan
St5801 a specification
Wlan networking and security
Wlan security
Webinar how to prepare for the sunset of 2G and 3G cellular communications
ออกแบบระบบเครือข่ายคอมเตอร์อาคาร3ชั้น
Wireless LAN Security by Arpit Bhatia
Home networking with zig bee
Accessing remote networks
Wireless LAN Security
Wlan security
LoRaWAN What is it good for - Mark Stanley, Mike Beardmore
Wireless Lan Security
Ad

Similar to Sniffers: Wired and Wireless Network (20)

PPT
CO2-Sniffing Types,MITM,ARP Explained Detail
PDF
Module 7 (sniffers)
PPT
Packet Sniffing
PDF
An Approach to Detect Packets Using Packet Sniffing
PPTX
Wiretapping
PDF
TH3 Professional Developper CEH sniffers
PDF
packet-sniffing-switched-environment-244
DOCX
Packet sniffer repot
DOCX
Packet sniffer repot
PPTX
Ethical Hacking - sniffing
PPTX
Packet sniffingin switch lans
PPTX
Roll No 63.pptx
PPTX
packet sniffing with Wireshark and its implementation.pptx
PPTX
Slides on Security issues in TCP/IP Clear explanation
PPTX
Packet sniffers
PPTX
Packet capturing
PPTX
Packet sniffers
PDF
Creating an Effective Network Sniffer
PPTX
Cyber_Threat_Intelligent_Cyber_Operation_Contest
PPTX
Network sniffers & injection tools
CO2-Sniffing Types,MITM,ARP Explained Detail
Module 7 (sniffers)
Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
Wiretapping
TH3 Professional Developper CEH sniffers
packet-sniffing-switched-environment-244
Packet sniffer repot
Packet sniffer repot
Ethical Hacking - sniffing
Packet sniffingin switch lans
Roll No 63.pptx
packet sniffing with Wireshark and its implementation.pptx
Slides on Security issues in TCP/IP Clear explanation
Packet sniffers
Packet capturing
Packet sniffers
Creating an Effective Network Sniffer
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Network sniffers & injection tools
Ad

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
A Presentation on Touch Screen Technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Approach and Philosophy of On baking technology
PPTX
1. Introduction to Computer Programming.pptx
PDF
Mushroom cultivation and it's methods.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Encapsulation theory and applications.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Hybrid model detection and classification of lung cancer
MIND Revenue Release Quarter 2 2025 Press Release
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A Presentation on Touch Screen Technology
Assigned Numbers - 2025 - Bluetooth® Document
Approach and Philosophy of On baking technology
1. Introduction to Computer Programming.pptx
Mushroom cultivation and it's methods.pdf
Zenith AI: Advanced Artificial Intelligence
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Encapsulation_ Review paper, used for researhc scholars
Chapter 5: Probability Theory and Statistics
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
cloud_computing_Infrastucture_as_cloud_p
Encapsulation theory and applications.pdf
Enhancing emotion recognition model for a student engagement use case through...
Hybrid model detection and classification of lung cancer

Sniffers: Wired and Wireless Network

  • 1. Network Sniffers Privacy Protection Thamer Alsuhbani Mikel Solabarrieta
  • 2. We are going talk about How do computers communicate in a LAN? How can we avoid be a victim? What is a Network Sniffer? Which are the risks of being monitored? Sniffers in Wired and Wireless Networks Conclusions
  • 3. How do computers communicate in a LAN? -- A local area network (LAN) is a computer network that interconnects computers within a limited area -- General Idea
  • 4. -- Sometimes things are not as we expected -- What is a Network Sniffer?
  • 5. -- A network sniffer monitors data flowing over computer network links in real time. -- What is a Network Sniffer? Sniffer mode
  • 6. -- Network adapters have differents operation modes -- How can be this possible? >> non-promiscuous mode >> promiscuous mode >> monitor mode -- If the package is not for this device drop it -- -- If the package is not for this device do not worry allow it in -- -- Just for wireless, it will capture everything in the “air” -- remember, at this point network adapters are filtering package using MAC address (LAYER2)
  • 7. -- Network adapters have differents operation modes -- How can be this possible? >> promiscuous mode Wired + Hub - do receive everything (broadcast, unicast and multicast packages, we really meant everything) *Wireless - it should receive everything on a network to which you have associated (broadcast, unicast and multicast packages, we really meant everything) Wired + Switch - do not receive everything (broadcast, unicast and multicast packages, that were send to this device) * it sometimes works, but it depends of the network adapters drivers
  • 8. -- Network adapters have differents operation modes -- How can be this possible? >> monitor mode Wireless - it must receive everything in the air (having in count, frequency, signal strength, channel, etc.) remember, we are sniffing the “air”, we are going to collect everything of every network (SSID) around, we do not need to be joined to one of them at all
  • 9. Sniffers in Wired and Wireless Networks Hub-based network -- In a hub, a frame is passed along or "broadcast" to every one of its ports -- Uncleverdevice -- broadcasting the same data out of each of its ports --
  • 10. Sniffers in Wired and Wireless Networks Switch-based network -- In a switch, a frame is passed to only one or multiple devices that need to receive it -- Smartdevice -- each port have a device and the switch will send the package directly to a port --
  • 11. Sniffers in Wired and Wireless Networks Access point-based network -- In wireless networks the communication going through the air using radio communication techniques-- -- The air is the way and we can sniff the air--
  • 12. Which are the risks of being monitored? FTP -- Some protocols were designed to manipulate data in plain text -- TELNET SMTP HTTP POP3 IMAPv4 SNMP plain text SFTP HTTPS* encrypted SMTPS* SSH *S This is for SSL or TLS
  • 13. Which are the risks of being monitored? plain text - http
  • 14. Which are the risks of being monitored? plain text - ftp
  • 15. How can we avoid be a victim? no longer plain text- sftp
  • 16. How can we avoid be a victim? no longer plain text- https
  • 17. How can we avoid be a victim? -- We should follow good practices when we are surfing on internet -- -- We should avoid using old and insecure known protocols --
  • 18. Can I sniff someone else wifi? Is this illegal?