Passive SniffersSniffers that passively wait for traffic to be sent to themWell suited for hub environmentSnortSniffit Island Hopping AttackAttacker initially takes over a machine via some exploit Attacker installs a sniffer to capture userIDs and passwords to take over other machines ![]() SnifferAllows attacker to see everything sent across the network, including userIDs and passwordsNIC placed in promiscuous modeTcpdump ![]() Tools used in Network AttacksSniffingSpoofingSession hijackingNetcat ![]() Chapter 8 Phase3: Gaining Access Using Network Attacks
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |