Jump to content

Sniffing attack

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by ColdRainyDay45 (talk | contribs) at 07:02, 15 August 2020 (I added hyperlinks to other Wikipedia articles in the "Prevention" and "General" sections.). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Sniffing attack or a sniffer attack, in context of network security, corresponds to theft or interception of data by capturing the network traffic using a sniffer (an application aimed at capturing network packets). When data is transmitted across networks, if the data packets are not encrypted, the data within the network packet can be read using a sniffer.[1] Using a sniffer application, an attacker can analyze the network and gain information to eventually cause the network to crash or to become corrupted, or read the communications happening across the network.[2]

General

Sniffing attacks can be compared to tapping of phone wires and get to know about the conversation, and for this reason, it is also referred as wiretapping applied to computer networks. Using sniffing tools, attackers can sniff sensitive information from a network, including Email traffic (SMTP, POP, IMAP traffic), Web traffic (HTTP), FTP traffic (Telnet authentication, FTP Passwords, SMB, NFS) and many more. The Packet Sniffer utility usually sniffs the network data without making any modifications in the network's packets. Packet sniffers can just watch, display, and log the traffic, and this information can be accessed by the attacker.[3]

Prevention

To prevent networks from sniffing attacks, organizations and individual users should keep away from applications that are using insecure protocols, like basic HTTP authentication, File Transfer Protocol (FTP), and Telnet. Instead, secure protocols such as HTTPS, Secure File Transfer Protocol (SFTP), and Secure Shell (SSH) should be preferred. In case there is a necessity for using any insecure protocol in any application, all the data transmission should be encrypted. If required, VPN (Virtual Private Networks) can be used to provide secure access to users.[4]

See also

References

  1. ^ "Types of attacks - Sniffer Attack". Omnisecu.com. OmniSecu. Retrieved 11 September 2017.
  2. ^ "Common Types of Network Attacks". Technet.microsoft.com. Microsoft. Retrieved 11 September 2017.
  3. ^ "Packet sniffing". Colasoft.com. Colasoft. Retrieved 11 September 2017.
  4. ^ "What is a Wireless Sniffer?". Veracode.com. Veracode. Retrieved 11 September 2017.