SlideShare a Scribd company logo
1 of 26
Packet Sniffing in LAN
Arpit Suthar
Software Consultant
Knoldus Software
• Packet sniffing is a technique of monitoring every
packet that crosses the network.
Host
A
Host B
Router
A
Router
B
Packet Sniffing in LAN
Uses of Packet Sniffers
• Capturing clear-text usernames and passwords
• Capturing and replaying Voice over IP telephone conversations
• Mapping a network
• Breaking into a target computer and installing remotely controlled sniffing
software.
• Redirecting communications to take a path that includes the intruder’s
computer.
• Conversion of Network traffic into human readable form.
• Network analysis to find the bottlenecks.
• Network intrusion detection to monitor for attackers.
•IP –Based sniffing : This is the original way of packet sniffing.
It works by putting the network card into promiscuous mode
and sniffing all packets matching the IP address filter
•MAC-Based Sniffing : This method works by putting the
network card into promiscuous mode and sniffing all packets
matching the MAC address filter.
•ARP-Based Sniffing : We will take this in detail.
Sniffing Methods-
What is ARP
➢ ARP () converts an IP Address to its corresponding physical network
address(MAC). operating at Layer 2 of the OSI model.
➢ ARP works on Ethernet networks as follows. Ethernet network adapters are
produced with a physical address embedded in the hardware called the Media
Access Control (MAC) address. Manufacturers take care to ensure these 6-byte (48-
bit) addresses are unique, and Ethernet relies on these unique identifiers for message
delivery. When any device wishes to send data to another target device over
Ethernet, it must first determine the MAC address of that target given its IP address
These IP-to-MAC address mappings are derived from an ARP cache maintained on
each device. If the given IP address does not appear in a device's cache, that device
cannot direct messages to that target until it obtains a new mapping. To do this, the
initiating device first sends an ARP request broadcast message on the local subnet.
The host with the given IP address sends an ARP reply in response to the broadcast,
allowing the initiating device to update its cache and proceed to deliver messages
directly to the target.
ARP Cache Table :-
ARP Poisoning :-
➢ ARP Spoofing is a type of attack in which a malicious actor sends falsified
ARP (Address Resolution Protocol) messages over a local area network.
This results in the linking of an attacker’s MAC address with the IP address
of a legitimate computer or server on the network. Once the attacker’s
MAC address is connected to an authentic IP address the attacker will begin
receiving any data that is intended for that IP address. ARP spoofing can
enable malicious parties to intercept, modify, or even stop data in-transit.
ARP spoofing attacks can only occur on local area networks that utilize the
Address Resolution Protocol.
➢ The effects of ARP spoofing attacks can have serious implications for
enterprises. In their most basic application ARP spoofing attacks are used to
steal sensitive information. Beyond this, ARP spoofing attacks are often
used to facilitate other attacks such as:
▪ Denial-of-service attack: DoS attacks often leverage ARP spoofing to
link multiple IP addresses with a single target’s MAC address. As a
result, traffic that is intended for many different IP addresses will be
redirected to the target’s MAC address, overloading the target with
traffic.
▪ Session hijacking: Session hijacking attacks can use ARP spoofing to
steal session IDs, granting attackers access to private systems and data.
▪ Man-in-the-middle attack: MitM attacks can rely on ARP spoofing to
intercept and modify traffic between victims.
ARP Spoofing Attacks:-
Man-in-the-middle Attack :-
Packet Sniffing tools:-
➢ WireShark
➢ Cain and Abel
➢ Kismet
➢ Tcpdump
➢ Ettercap
➢ NetStumbler
➢ Dsniff
➢ Ntop
➢ Ngrep
➢ And many more…
Practical of Packet Sniffing and ARP poisoning:-
➢ We will use tool “Cain and Abel” for this.
➢ Its very easy and handy tool for beginners.
➢ Scenario: A LAN with 5 PC (192.168.0.101,192.168.0.102, 192.168.0.103,
192.168.0.105 192.168.0.107(hacker) and a default gateway(192.168.0.1)
➢ So here are screenshots for this.
Step 1:- Main window of Cain and Abel
Step 2:- Click on Sniffer tab
Step 3 :- Turn on the Sniffer
Step 4:- Click on + so a window “MAC Add scanner” will appear click on OK
Step 5:- So now all the connected host will appear.
Step 6:- Now Click on the down tab “APR”
Step 7:- Now click on the + button
Step 8:- Now a window “New ARP Poison Routing” will come and all the host
and the default gateway will shown
Step 9:- So click on your default Gateway, so all the host will come.
Step 10 :- Select all them and click OK
Step 11 :- Now click on Start APR logo.
Step 12:- Poisoning starts!!!
Step 13 :- Now when a Host open any website which contain any form and
type his/her info that will be sniffed…!!!
Step 14 :- GOT…!!! ☺
Packet sniffing in LAN

More Related Content

What's hot

Windows internals Essentials
Windows internals EssentialsWindows internals Essentials
Windows internals EssentialsJohn Ombagi
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port ScanningSam Bowne
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationgaurav96raj
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer vilss
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics IntroJake K.
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysisBikrant Gautam
 
Footprinting
FootprintingFootprinting
FootprintingDuah John
 
Network scanning
Network scanningNetwork scanning
Network scanningoceanofwebs
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK frameworkBhushan Gurav
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort webhostingguy
 

What's hot (20)

Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Windows internals Essentials
Windows internals EssentialsWindows internals Essentials
Windows internals Essentials
 
Ch 5: Port Scanning
Ch 5: Port ScanningCh 5: Port Scanning
Ch 5: Port Scanning
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
NMap
NMapNMap
NMap
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Packet Sniffer
Packet Sniffer Packet Sniffer
Packet Sniffer
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Snort
SnortSnort
Snort
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 
Footprinting
FootprintingFootprinting
Footprinting
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
 

Viewers also liked

Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning Viren Rao
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHackingAve Nawsh
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANsIshraq Al Fataftah
 
Intro to Obj-C Design Patterns or Or how I learned to be less bad
Intro to Obj-C Design Patterns or Or how I learned to be less badIntro to Obj-C Design Patterns or Or how I learned to be less bad
Intro to Obj-C Design Patterns or Or how I learned to be less badHaris Amin
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 
Cain
CainCain
Caingasay
 
09 Cain And Abel
09 Cain And Abel09 Cain And Abel
09 Cain And AbelMaranata
 
School Memories
School Memories School Memories
School Memories Amrita
 
MITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles ClubMITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles ClubShritesh Bhattarai
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection toolsvishalgohel12195
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical HackingDivyank Jindal
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingRavi Sankar
 
School life ppt studies uralsk
School life ppt  studies uralskSchool life ppt  studies uralsk
School life ppt studies uralskGalina Timofeyeva
 

Viewers also liked (20)

Packet sniffing & ARP Poisoning
 Packet sniffing & ARP Poisoning  Packet sniffing & ARP Poisoning
Packet sniffing & ARP Poisoning
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Information security & EthicalHacking
Information security & EthicalHackingInformation security & EthicalHacking
Information security & EthicalHacking
 
Arp Cache Poisoning
Arp Cache PoisoningArp Cache Poisoning
Arp Cache Poisoning
 
Packet sniffing in switched LANs
Packet sniffing in switched LANsPacket sniffing in switched LANs
Packet sniffing in switched LANs
 
Protection contre l'ARP poisoning et MITM
Protection contre l'ARP poisoning et MITMProtection contre l'ARP poisoning et MITM
Protection contre l'ARP poisoning et MITM
 
Intro to Obj-C Design Patterns or Or how I learned to be less bad
Intro to Obj-C Design Patterns or Or how I learned to be less badIntro to Obj-C Design Patterns or Or how I learned to be less bad
Intro to Obj-C Design Patterns or Or how I learned to be less bad
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Cain
CainCain
Cain
 
Presentation skills
Presentation skillsPresentation skills
Presentation skills
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
09 Cain And Abel
09 Cain And Abel09 Cain And Abel
09 Cain And Abel
 
School Memories
School Memories School Memories
School Memories
 
MITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles ClubMITM Attacks with Ettercap : TTU CyberEagles Club
MITM Attacks with Ettercap : TTU CyberEagles Club
 
Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
Hacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical HackingHacktrikz - Introduction to Information Security & Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
 
Wireshark
WiresharkWireshark
Wireshark
 
School life ppt studies uralsk
School life ppt  studies uralskSchool life ppt  studies uralsk
School life ppt studies uralsk
 

Similar to Packet sniffing in LAN

Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffingBhavya Chawla
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Securityprachi67
 
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...IJNSA Journal
 
04-post-connection-attacks.pdf
04-post-connection-attacks.pdf04-post-connection-attacks.pdf
04-post-connection-attacks.pdfxasako1838
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasuresdkaya
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxMahdiHasanSowrav
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksIOSR Journals
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityLearningwithRayYT
 

Similar to Packet sniffing in LAN (20)

Packet capturing
Packet capturingPacket capturing
Packet capturing
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
Unit 3:Enterprise Security
Unit 3:Enterprise SecurityUnit 3:Enterprise Security
Unit 3:Enterprise Security
 
Sniffing via dsniff
Sniffing via dsniffSniffing via dsniff
Sniffing via dsniff
 
Packet sniffingin switch lans
Packet sniffingin switch lansPacket sniffingin switch lans
Packet sniffingin switch lans
 
ARP Spoofing.pptx
ARP Spoofing.pptxARP Spoofing.pptx
ARP Spoofing.pptx
 
Wiretapping
WiretappingWiretapping
Wiretapping
 
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
 
Networking.pdf
Networking.pdfNetworking.pdf
Networking.pdf
 
04-post-connection-attacks.pdf
04-post-connection-attacks.pdf04-post-connection-attacks.pdf
04-post-connection-attacks.pdf
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Scanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptxScanning and Enumeration in Cyber Security.pptx
Scanning and Enumeration in Cyber Security.pptx
 
Nnnnnn
NnnnnnNnnnnn
Nnnnnn
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
D017131318
D017131318D017131318
D017131318
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
Commands used in Assessing Network layout & Security
Commands used in Assessing Network layout & SecurityCommands used in Assessing Network layout & Security
Commands used in Assessing Network layout & Security
 
6005679.ppt
6005679.ppt6005679.ppt
6005679.ppt
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 

Packet sniffing in LAN

  • 1. Packet Sniffing in LAN Arpit Suthar Software Consultant Knoldus Software
  • 2. • Packet sniffing is a technique of monitoring every packet that crosses the network. Host A Host B Router A Router B Packet Sniffing in LAN
  • 3. Uses of Packet Sniffers • Capturing clear-text usernames and passwords • Capturing and replaying Voice over IP telephone conversations • Mapping a network • Breaking into a target computer and installing remotely controlled sniffing software. • Redirecting communications to take a path that includes the intruder’s computer. • Conversion of Network traffic into human readable form. • Network analysis to find the bottlenecks. • Network intrusion detection to monitor for attackers.
  • 4. •IP –Based sniffing : This is the original way of packet sniffing. It works by putting the network card into promiscuous mode and sniffing all packets matching the IP address filter •MAC-Based Sniffing : This method works by putting the network card into promiscuous mode and sniffing all packets matching the MAC address filter. •ARP-Based Sniffing : We will take this in detail. Sniffing Methods-
  • 5. What is ARP ➢ ARP () converts an IP Address to its corresponding physical network address(MAC). operating at Layer 2 of the OSI model. ➢ ARP works on Ethernet networks as follows. Ethernet network adapters are produced with a physical address embedded in the hardware called the Media Access Control (MAC) address. Manufacturers take care to ensure these 6-byte (48- bit) addresses are unique, and Ethernet relies on these unique identifiers for message delivery. When any device wishes to send data to another target device over Ethernet, it must first determine the MAC address of that target given its IP address These IP-to-MAC address mappings are derived from an ARP cache maintained on each device. If the given IP address does not appear in a device's cache, that device cannot direct messages to that target until it obtains a new mapping. To do this, the initiating device first sends an ARP request broadcast message on the local subnet. The host with the given IP address sends an ARP reply in response to the broadcast, allowing the initiating device to update its cache and proceed to deliver messages directly to the target.
  • 7. ARP Poisoning :- ➢ ARP Spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network. Once the attacker’s MAC address is connected to an authentic IP address the attacker will begin receiving any data that is intended for that IP address. ARP spoofing can enable malicious parties to intercept, modify, or even stop data in-transit. ARP spoofing attacks can only occur on local area networks that utilize the Address Resolution Protocol.
  • 8. ➢ The effects of ARP spoofing attacks can have serious implications for enterprises. In their most basic application ARP spoofing attacks are used to steal sensitive information. Beyond this, ARP spoofing attacks are often used to facilitate other attacks such as: ▪ Denial-of-service attack: DoS attacks often leverage ARP spoofing to link multiple IP addresses with a single target’s MAC address. As a result, traffic that is intended for many different IP addresses will be redirected to the target’s MAC address, overloading the target with traffic. ▪ Session hijacking: Session hijacking attacks can use ARP spoofing to steal session IDs, granting attackers access to private systems and data. ▪ Man-in-the-middle attack: MitM attacks can rely on ARP spoofing to intercept and modify traffic between victims. ARP Spoofing Attacks:-
  • 10. Packet Sniffing tools:- ➢ WireShark ➢ Cain and Abel ➢ Kismet ➢ Tcpdump ➢ Ettercap ➢ NetStumbler ➢ Dsniff ➢ Ntop ➢ Ngrep ➢ And many more…
  • 11. Practical of Packet Sniffing and ARP poisoning:- ➢ We will use tool “Cain and Abel” for this. ➢ Its very easy and handy tool for beginners. ➢ Scenario: A LAN with 5 PC (192.168.0.101,192.168.0.102, 192.168.0.103, 192.168.0.105 192.168.0.107(hacker) and a default gateway(192.168.0.1) ➢ So here are screenshots for this.
  • 12. Step 1:- Main window of Cain and Abel
  • 13. Step 2:- Click on Sniffer tab
  • 14. Step 3 :- Turn on the Sniffer
  • 15. Step 4:- Click on + so a window “MAC Add scanner” will appear click on OK
  • 16. Step 5:- So now all the connected host will appear.
  • 17. Step 6:- Now Click on the down tab “APR”
  • 18. Step 7:- Now click on the + button
  • 19. Step 8:- Now a window “New ARP Poison Routing” will come and all the host and the default gateway will shown
  • 20. Step 9:- So click on your default Gateway, so all the host will come.
  • 21. Step 10 :- Select all them and click OK
  • 22. Step 11 :- Now click on Start APR logo.
  • 23. Step 12:- Poisoning starts!!!
  • 24. Step 13 :- Now when a Host open any website which contain any form and type his/her info that will be sniffed…!!!
  • 25. Step 14 :- GOT…!!! ☺