SlideShare a Scribd company logo
Mustajar Ahmad Shah
Wiretapping
• Introduction
• What is sniffer
• Sniffing Threats
• How a sniffer Work
• Type of Sniffing
• Protocol vulnerable to sniffing
• Tools to Sniff Network Traffic
• How to setup a Sniffing Attack
• How to protect your self from Sniffing
• Tools to detect sniffer on a network
Wire tapping is process of monitoring the Telephone and Internet conversation
by third party.
Type of Wiretapping
A Sniffer is a packet-capturing or frame-capturing tool.
It basically captures and displays the data as it is being transmitted from host to
host on the network.
Wiretapping
A Sniffer turns the NIC of a system into Promiscuous(pro-mis-cu-os) mode
so that it listen all the data transmitted on its segment.
Sniffer can constantly Read all the information entering to the computer
through NIC by Decoding the Information encapsulated in Data Packet.
There are Two types of Sniffing Attack
Active Sniffing
Passive Sniffing
“Passive Sniffing “mean sniffing trough a Hub.
Passive Sniffing Involves sending no packets, and
Monitoring the Packets sent by others.
But Hub Usage is Outdated today.
When Sniffing is performed on a Switched network, is
known as “Active Sniffing”.
Active Sniffing Relies on Injecting Packets (ARP) into the
Network, that Cause traffic.
Telnet
and
Rlogin
HTTP SMTP NNTP POP FTP IMAP
Keystrokes including User
Name & Passwords
Data sent in clear text
Password and data sent in clear text
Password and data sent in clear text
SPAN Port is Port which is configure to Receive a Copy
of Every Packet that passes through a Switch
Sniffing Tools
WireShark
TCP Dump
Cain & Able
Capsa
Wiretapping
Wiretapping
Wiretapping
Wiretapping
Wiretapping
Wiretapping
Wiretapping
Wiretapping
Wiretapping
Wiretapping
Wiretapping
Wiretapping
Wiretapping
Restrict the physical access to the network media to ensure that a packet
sniffer cannot be installed
Use Encryption to protect confidential information
Permanently Add MAC address of the Gateway to ARP cache
Use static IP Address and Static ARP tables to prevent attacker from
adding the spoofed ARP entries for machines in the network
Turn off network identification broadcasts and if possible restrict the
network to authorized users in order to protect network form being with
sniffing tools
Use UPv6 instead of IPv4 protocol
Use encrypted session such as SSJ instead of Telnet, Secure Copy (SCP)
instead of FTP, SSL for E-mail connection, etc. to protect wireless
network users against sniffing attack.
Use Network Tools
Such as HP
Performance insight to
monitor the network for
strange Packets
Use IDS
Detect
Promiscuous Mode
Wiretapping
Wiretapping
Wiretapping
Wiretapping

More Related Content

PPT
Module 5 Sniffers
PPTX
Prensentation on packet sniffer and injection tool
PPTX
Network sniffers & injection tools
PPTX
Ethical Hacking - sniffing
PDF
Sniffing via dsniff
PPTX
Packet sniffing in LAN
PPTX
Packet sniffing in switched LANs
PPTX
Packet sniffers
Module 5 Sniffers
Prensentation on packet sniffer and injection tool
Network sniffers & injection tools
Ethical Hacking - sniffing
Sniffing via dsniff
Packet sniffing in LAN
Packet sniffing in switched LANs
Packet sniffers

What's hot (20)

PPT
Packet Sniffing
PPTX
Password sniffing
PPT
PPTX
Packet Sniffer
DOCX
Packet sniffer repot
PPTX
PACKET Sniffer IMPLEMENTATION
PDF
Packet sniffing & ARP Poisoning
PDF
Packet sniffing
PPTX
Network packet analysis -capture and Analysis
PPTX
Firewallpresentation 100826052003-phpapp02(1)
PPTX
Network Protocol Analyzer
PPTX
Packet sniffers
PPTX
Introduction to Snort
PPT
PPTX
Snort
PPTX
Wireless Attacks
PPT
Hacking Cisco
PPT
Network sec 1
PDF
Java Abs Packet Sniffer Tool
PPTX
Packet capturing
Packet Sniffing
Password sniffing
Packet Sniffer
Packet sniffer repot
PACKET Sniffer IMPLEMENTATION
Packet sniffing & ARP Poisoning
Packet sniffing
Network packet analysis -capture and Analysis
Firewallpresentation 100826052003-phpapp02(1)
Network Protocol Analyzer
Packet sniffers
Introduction to Snort
Snort
Wireless Attacks
Hacking Cisco
Network sec 1
Java Abs Packet Sniffer Tool
Packet capturing
Ad

Viewers also liked (12)

PPTX
Anti wiretapping-act
PPSX
Us legislation authorizing wiretapping
PDF
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
PDF
Anti wiretapping law and related issues consti-ii
KEY
Metasploit @ 2010 Utah Open Source Conference
PPTX
Social engineering
PPTX
Social engineering presentation
PDF
Metasploit
ODP
Sniffer
PPTX
Basic Metasploit
PDF
Metasploit for Penetration Testing: Beginner Class
Anti wiretapping-act
Us legislation authorizing wiretapping
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
Anti wiretapping law and related issues consti-ii
Metasploit @ 2010 Utah Open Source Conference
Social engineering
Social engineering presentation
Metasploit
Sniffer
Basic Metasploit
Metasploit for Penetration Testing: Beginner Class
Ad

Similar to Wiretapping (20)

PPTX
packet sniffing with Wireshark and its implementation.pptx
PPTX
Packet sniffingin switch lans
PPTX
Slides on Security issues in TCP/IP Clear explanation
PPT
CO2-Sniffing Types,MITM,ARP Explained Detail
PPTX
Packet sniffing
PDF
An Approach to Detect Packets Using Packet Sniffing
PDF
TH3 Professional Developper CEH sniffers
DOCX
Packet sniffer repot
PPT
Week 10 - Packet Sssdssssssssniffers.ppt
PPTX
Roll No 63.pptx
PPTX
Types of attacks Types of attacks Types of attacks Types of attacks Types of ...
PDF
packet-sniffing-switched-environment-244
PDF
Module 7 (sniffers)
PDF
Sniffers: Wired and Wireless Network
PPT
cyber forensics-enum,sniffing,malware threat.ppt
PDF
A Literature Review On Sniffing Attacks In Computer Network
PPTX
Cyber_Threat_Intelligent_Cyber_Operation_Contest
PDF
Ceh v5 module 07 sniffers
PPT
Ne Course Part Two
PPTX
Module 1..exp 4 (CS Worksho______p).pptx
packet sniffing with Wireshark and its implementation.pptx
Packet sniffingin switch lans
Slides on Security issues in TCP/IP Clear explanation
CO2-Sniffing Types,MITM,ARP Explained Detail
Packet sniffing
An Approach to Detect Packets Using Packet Sniffing
TH3 Professional Developper CEH sniffers
Packet sniffer repot
Week 10 - Packet Sssdssssssssniffers.ppt
Roll No 63.pptx
Types of attacks Types of attacks Types of attacks Types of attacks Types of ...
packet-sniffing-switched-environment-244
Module 7 (sniffers)
Sniffers: Wired and Wireless Network
cyber forensics-enum,sniffing,malware threat.ppt
A Literature Review On Sniffing Attacks In Computer Network
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Ceh v5 module 07 sniffers
Ne Course Part Two
Module 1..exp 4 (CS Worksho______p).pptx

More from Mr Cracker (14)

PPTX
Denial Of Service
PDF
How to setup mercury wifi router
PPTX
Hacking Citrix Cloud Server
PPTX
Unblock all the Blocked sites in China
PPTX
6 Blessed Sayings of Holy Prophet Muhammad
PPTX
Understanding DNS Traffic Pattern
PPTX
Xen and Art of Virtualization (Xen Architecture)
PPTX
China Vs World
PPTX
Virtualization, Cloud computing and OS Fingerprinting
PDF
Interesting Email Services (Email Hacks)
PPTX
The Mythical Man Month
PPTX
Google Hacking and Power Search Techniques
PPT
Facts you don’t know about pakistan
PPTX
Interesting email service’s
Denial Of Service
How to setup mercury wifi router
Hacking Citrix Cloud Server
Unblock all the Blocked sites in China
6 Blessed Sayings of Holy Prophet Muhammad
Understanding DNS Traffic Pattern
Xen and Art of Virtualization (Xen Architecture)
China Vs World
Virtualization, Cloud computing and OS Fingerprinting
Interesting Email Services (Email Hacks)
The Mythical Man Month
Google Hacking and Power Search Techniques
Facts you don’t know about pakistan
Interesting email service’s

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Modernizing your data center with Dell and AMD
PPTX
A Presentation on Artificial Intelligence
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
Modernizing your data center with Dell and AMD
A Presentation on Artificial Intelligence
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Mobile App Security Testing_ A Comprehensive Guide.pdf
The AUB Centre for AI in Media Proposal.docx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Monthly Chronicles - July 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Encapsulation_ Review paper, used for researhc scholars
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
CIFDAQ's Market Insight: SEC Turns Pro Crypto
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Approach and Philosophy of On baking technology

Wiretapping

  • 3. • Introduction • What is sniffer • Sniffing Threats • How a sniffer Work • Type of Sniffing • Protocol vulnerable to sniffing • Tools to Sniff Network Traffic • How to setup a Sniffing Attack • How to protect your self from Sniffing • Tools to detect sniffer on a network
  • 4. Wire tapping is process of monitoring the Telephone and Internet conversation by third party. Type of Wiretapping
  • 5. A Sniffer is a packet-capturing or frame-capturing tool. It basically captures and displays the data as it is being transmitted from host to host on the network.
  • 7. A Sniffer turns the NIC of a system into Promiscuous(pro-mis-cu-os) mode so that it listen all the data transmitted on its segment. Sniffer can constantly Read all the information entering to the computer through NIC by Decoding the Information encapsulated in Data Packet.
  • 8. There are Two types of Sniffing Attack Active Sniffing Passive Sniffing
  • 9. “Passive Sniffing “mean sniffing trough a Hub. Passive Sniffing Involves sending no packets, and Monitoring the Packets sent by others. But Hub Usage is Outdated today.
  • 10. When Sniffing is performed on a Switched network, is known as “Active Sniffing”. Active Sniffing Relies on Injecting Packets (ARP) into the Network, that Cause traffic.
  • 11. Telnet and Rlogin HTTP SMTP NNTP POP FTP IMAP Keystrokes including User Name & Passwords Data sent in clear text Password and data sent in clear text Password and data sent in clear text
  • 12. SPAN Port is Port which is configure to Receive a Copy of Every Packet that passes through a Switch
  • 27. Restrict the physical access to the network media to ensure that a packet sniffer cannot be installed Use Encryption to protect confidential information Permanently Add MAC address of the Gateway to ARP cache Use static IP Address and Static ARP tables to prevent attacker from adding the spoofed ARP entries for machines in the network
  • 28. Turn off network identification broadcasts and if possible restrict the network to authorized users in order to protect network form being with sniffing tools Use UPv6 instead of IPv4 protocol Use encrypted session such as SSJ instead of Telnet, Secure Copy (SCP) instead of FTP, SSL for E-mail connection, etc. to protect wireless network users against sniffing attack.
  • 29. Use Network Tools Such as HP Performance insight to monitor the network for strange Packets Use IDS Detect Promiscuous Mode