Switched Environment: Sniffing Review

Abdur Ali

Abstract


This paper concentrates on the risk of bundle sniffing in an exchanged domain, and quickly investigates the impact in a non-exchanged environment. Point of interest is given on a number of procedures, for example, "ARP (Address Resolution Protocol) mocks”, which can permit an assailant to spy on system movement in an exchanged domain. Outsider devices exists that license sniffing on an exchanged system. The aftereffect of running some of these apparatuses on a detached, exchanged system is introduced, and plainly shows that the danger they posture is genuine and noteworthy. The last segment covers approaches to moderate the danger of system sniffing in both non-switched also, exchanged situations. The theory of this paper is that encryption is the main genuine resistance to the risk of sniffing. 

Keywords: Address resolution protocol, indiscriminate, sniffing 


Full Text:

PDF

References


Verton, Dan. “Analysts: Insiders may pose security threat”. 10 October 2001.

Graham, Robert. “Sniffing (network wiretap, sniffer) FAQ”. Version 0.3.3. 14 September 2000.

Tyson, Jeff. “How LAN Switches Work”.

Seki, Hidenobu. “Cracking NTLMv2 Authentication”.

Vidstrom, Arne. “Kerbcrack”.

Seki, Hidenobu. “ScoopLM”. January 2002.

Whalen, Sean. “An Introduction to ARP Spoofing”. Revision 1. April 2001.


Refbacks

  • There are currently no refbacks.