SNIFFING Class : III B.Sc Cyber Security Subject : Ethical Hacking Subject Code : XCI503B Presented By Mr. S.Vignesh (AP/CS) Department of Computer Science
What is Sniffing ? Process of monitoring and capturing network data. Uses sniffers (software tools) Requires NIC in promiscuous mode to capture all packets
TYPES OF SNIFFING Passive sniffing : On hubs (outdated now). Captures all traffic in a collision domain. Hub : Send to All Devices Active sniffing : On switched networks Uses techniques like ARP spoofing or port mirroring (SPAN) Switch : Send by address
Port Mirroring / SPAN SPAN (Switched Port Analyzer) = P ort M irroring. Forwards all switch traffic to a designated port Useful for sniffers & IDS tools (e.g., Snort )
Tools for Sniffing Range from free to <$1,000 Wireshark → most popular open-source sniffer Other tools : RSA NetWitness → deep packet inspection OmniPeek → commercial sniffer with GUI Dsniff suite → includes Filesnarf , Mailsnarf , Urlsnarf , Webspy TCPdump → command-line Linux sniffer WinDump → Windows port of TCPdump
Wireshark Features Views of captured traffic : Summary view → one-line-per-packet Detail view → expand packet fields Hex view → raw packet data in hex
SNIFFING COUNTERMEASURES Static ARP entries (not feasible on large networks) Port security → restricts allowed MAC addresses per port Dynamic ARP Inspection (DAI) → validates ARP packets (Cisco feature) IP Source Guard → prevents IP spoofing on untrusted Layer 2 ports DNSSEC (RFC 4035) → digitally signs DNS replies to prevent DNS spoofing
SPOOFING Spoofing is a technique where an attacker pretends to be someone or something else by falsifying data, with the goal of tricking systems or users into trusting them. It’s basically impersonation in the digital world .