Cybersecurity â Attack and Defense Strategies by Yuri Diogenes Erdal Ozkaya
Author:Yuri Diogenes, Erdal Ozkaya
Language: eng
Format: epub
Publisher: Packt
Published: 2019-12-26T12:07:09+00:00
Network Sniffing
Attackers use different methods to sniff the network, such as hacking, in order to gain access to a workstation and then from there begin sniffing. Eventually, they could hack the wireless network or gain access to the network via insiders.
A switched network in promiscuous mode will have less sniffing dangers but attackers still can gain access to credentials that can be specially sent in clear text via Wireshark, as explained in Chapter 6, Compromising the System, previously. User segments can be subjected to man-in-the-middle attacks, or ARP spoofing.
Figure 16 displays how hackers can capture passwords via sniffing and capturing packets.
Figure 16: Capturing username and passwords via Wireshark
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7724)
Robo-Advisor with Python by Aki Ranin(7620)
Offensive Shellcode from Scratch by Rishalin Pillay(6103)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(5021)
Ego Is the Enemy by Ryan Holiday(4957)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
Python for ArcGIS Pro by Silas Toms Bill Parker(4180)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3886)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3623)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3285)
Speed Up Your Python with Rust by Maxwell Flitton(3231)
Liar's Poker by Michael Lewis(3222)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3195)
Extreme DAX by Michiel Rozema & Henk Vlootman(3172)
Agile Security Operations by Hinne Hettema(3124)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3109)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3083)
Cryptography Algorithms by Massimo Bertaccini(3001)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2983)
