This website uses cookies to ensure you have the best experience. Learn more

Packet Sniffing Essay

3387 words - 14 pages

A SEMINAR REPORT ON |
PACKET SNIFFER |
SUBMITTED BY SUBMITTED ONKUNAL GOPAL THAKUR MAY 14,2010VISHAL SHIRGUPPIJUSTIN FRANCISSHAZIA ALIUNDER THE GUIDANCE OF MR. SUNIL SURVEFR. CONCEICAO RODRIGUES COLLEGE OF ENGINEERINGBANDRA(W)MUMBAI – 400 050 |

CERTIFICATE

This is to certify that, Mr. KUNAL GOPAL THAKUR , Mr. VISHAL SHIRGUPPI ,Mr. JUSTIN FRANCIS and Ms. SHAZIA ALI have completed their project on PACKET SNIFFER satisfactorily in partial fulfillment under the department of Computer Engineering during academic year 2009-2010.


...view middle of the document...

[------PACKET SNIFFER DETECTION WITH ANTI SNIFF]

Table of Contents
1.0 Introduction.......................................................................................................................................................1

2.0 What is a packet sniffer? .................................................................................................................................2

3.0 Uses of a packet sniffer....................................................................................................................................3

4.0Sniffing tool……………………………………………………………………………………....4

5.0 Sniffing methods ..............................................................................................................................................5

5.1.1 IP-based sniffing ...........................................................................................................................................5

5.1.2 MAC-based sniffing ......................................................................................................................................5

5.1.3 ARP-based sniffing........................................................................................................................................5

6.0 Anti sniff assumption........................................................................................................................................7

7.0 Anti-Sniff detection methods…………………………………………………………………….7

7.1 Mac Detection…………………………………………………………………………………..7

7.1.1 Ethernet Network Interface Cards…………………………………………………………….8

7.1.2 TCP/IP on Ethernet ………………………………………………………………………….8
7.1.3 Implementation ……………………………….………………………………………………8
7.1.4 Results ………………………………………………………………………………………..9
7.2 DNS Detection………………………………………………………………………………….10
7.2.1 Exploit Sniffer Behavior………………………………………………………………………11
7.2.2 Implementation……………………………………………………………………………….12
7.2.3 Results ………………………………………………………………………………………..13
8.0 Conclusion……………………………………………………………………………………...14
9.0 References……………………………………………………………………………………....15

1.0 Introduction
Packet sniffing is a technique of monitoring every packet that crosses the network. A packet sniffer is a piece of software or hardware that monitors all network traffic. This is unlike standard network hosts that only receive traffic sent specifically to them. The security threat presented by sniffers is their ability to capture all incoming and outgoing traffic, including clear-text passwords and user names or other sensitive material. In theory, it’s impossible to detect these sniffing tools because they are passive in nature, meaning that they only collect data. While they can be fully passive, some aren’t therefore they can be detected. This paper discusses the different packet sniffing methods and explains how Anti-Sniff tries to detect these sniffing programs.

2. Working of packet sniffer:
A packet sniffer works by looking at every packet sent in the...

Other Papers Like Packet Sniffing

IS3110 Assignment 1

534 words - 3 pages software. The LAN domain is the area inside the firewall. Each individual device must be protected. Data transferred within the LAN isn’t protected as thoroughly as if it were sent outside the LAN. This leads to a vulnerability of packet sniffing. Another vulnerability that needs to be mitigated in the LAN domain is preventing rogue users from unauthorized WLAN access. A high level of security is required to keep the LAN-to-WAN Domain safe. The

Obesity Essay

986 words - 4 pages Hijacking attack compromises the session token by stealing or predicting a valid session token. A session token could be compromised in different way such as; Predictable Session Token, Session Sniffing, Client-Side Attacks (malicious codes, Trojans, etc.), Man-In-The-Middle Attacks and Man-In-The-Browser Attacks. This is a major threat to the eLite Bankers Company if steps are not taken to prevent these hijackings as hijackers may get

Teaching Hacking in College

1111 words - 5 pages holes could be closed faster, so that hackers are not able to take advantage and gain access to information that is private. Programmers and network security analysts should already know how to use network packet sniffing tools, and how to recognize when a hacker is within their network. Hackers also try to disrupt businesses from working by creating and distributing malware and viruses. According to Carnevale (2005, p. A41) “hacker attacks

Suck This

1195 words - 5 pages [Company Name] or other network resources, including, but not limited to, accessing data, servers, or accounts to which you are not authorized; circumventing user authentication on any device; or sniffing network traffic. 2 Causing a disruption of service to either [Company Name] or other network resources, including, but not limited to, ICMP floods, packet spoofing, denial of service, heap or buffer overflows, and forged routing information for

Abut Stack

1195 words - 5 pages [Company Name] or other network resources, including, but not limited to, accessing data, servers, or accounts to which you are not authorized; circumventing user authentication on any device; or sniffing network traffic. 2 Causing a disruption of service to either [Company Name] or other network resources, including, but not limited to, ICMP floods, packet spoofing, denial of service, heap or buffer overflows, and forged routing information for

Home Computer Security

3757 words - 16 pages those that do not meet the specified security criteria.There are several types of firewall techniques: * Packet filter: Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. * Application gateway: Applies security mechanisms to specific

Map Hindustan

5865 words - 24 pages the use of physical characteristics such as retinal images to provide identification. Answer: TRUE Diff: 1 Page Ref: 242 AACSB: Reflective Thinking CASE: Comprehension 15) Packet filtering catches most types of network attacks. Answer: FALSE Diff: 2 Page Ref: 244 AACSB: Use of IT CASE: Comprehension 16) NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs. Answer: TRUE

Riordan Manufacturing Indp, Part 3

1904 words - 8 pages to network security we need to address. Some common network attacks are denial of service (DoS), packet fragment, spoofing, or sniffing. Several mechanisms such as viruses, plug-ins, and malicious code are used to perpetrate these attacks (Microsoft, 2006). One of the most prominent threats to the network is denial of service attacks (DoS). Though not as prominent as it was a few years ago, this threat still exists and is still used by hackers

Week 7 Project Paper

3453 words - 14 pages /articles/secure_my_business/what_is_network_security/index.html. Cert. Home Network Security. Retrieved from http://www.cert.org/historical/tech_tips/home_networks.cfm. Matt Curtain. InterHack. Kent Information Services. Introduction to Network Security. Retrieved from http://www.interhack.net/pubs/network-security/. Tom King. August 4, 2002. Packet Sniffing in a Switched Environment. Retrieved from http://www.sans.org/reading-room

Network Design Proposal

3120 words - 13 pages Sniffing Packet sniffer is a system that catches information from data parcels as they go over the system. That information may incorporate client names and passwords that go over the system in clear content. With maybe hundreds or a great many passwords caught by the bundle sniffer, interlopers can dispatch across the board assaults on frameworks. Introducing a bundle sniffer does not as a matter of course require manager level access. Link modem

technical paper

2818 words - 12 pages able to directly communicate with workstations on another VLAN. When properly configured, VLAN segmentation severely hinders access to system attack surfaces. It reduces packet-sniffing capabilities and increases threat agent effort. Finally, authorized users only “see” the servers and other devices necessary to perform their daily tasks CITATION Olz12 \l 1033 (Olzak, 2012). Another assumption made by this report is that the Oracle 9i Database

Related Essays

Packet Sniffing Prevention Essay

573 words - 3 pages Packet Sniffing Prevention Blocking a Wireless Sniffer-Public Connection • Disable the automatic connection feature in wireless settings • Configure a firewall that is automatically installed with Window updates. Enhance the strength of the firewall and increase security settings to “block all incoming connections” • Confirm the public network’s home page includes a privacy policy. (Networks that use encryption to protect other users

Packet Sniffer Report

8200 words - 33 pages IMPLEMENTATION OF PACKET SNIFFING IN JAVA USING JPCAP LIBRARY Project Report Submitted in Partial Fulfillment of the Requirement for the Award of Degree of Bachelor of Engineering in Computer Science Engineering of Rajiv Gandhi Proudyogiki Vishwavidalaya, Bhopal (MP) By Siddharth Pateriya Swarna Swaminathan (0131CS081077) (0131CS081084) Department of Computer Science Engineering Jai Narain College of

Ip Spoofing Essay

3206 words - 13 pages  actions. Such actions can range from sniffing a packet to presenting a shell from the online host to the attacker's machine. Determining the State of a Firewall A firewall is used to protect a network from Internet intruders. Packets entering a firewall are checked against an Access Control List (ACL). TCP packets sent by a source are acknowledged by acknowledgment packets. If a packet seems like an acknowledgement to a request or data from the

Ftp File Transfer Protocol Essay

755 words - 4 pages when the organization is limited in some unique way from being able to send via Secure FTP. * NOTE: All PHI data must be encrypted if sending via Standard FTP. * Port 21 using Standard FTP client to connect to ftp.medassets.com Security FTP was not designed to be a secure protocol—especially by today's standards—and has many security weaknesses. Bounce attacks Spoof attacks Brute force attacks Packet capture (sniffing) Username