Cybersecurity – Attack and Defense Strategies by Yuri Diogenes Erdal Ozkaya

Cybersecurity – Attack and Defense Strategies by Yuri Diogenes Erdal Ozkaya

Author:Yuri Diogenes, Erdal Ozkaya
Language: eng
Format: epub
Publisher: Packt
Published: 2019-12-26T12:07:09+00:00


Network Sniffing

Attackers use different methods to sniff the network, such as hacking, in order to gain access to a workstation and then from there begin sniffing. Eventually, they could hack the wireless network or gain access to the network via insiders.

A switched network in promiscuous mode will have less sniffing dangers but attackers still can gain access to credentials that can be specially sent in clear text via Wireshark, as explained in Chapter 6, Compromising the System, previously. User segments can be subjected to man-in-the-middle attacks, or ARP spoofing.

Figure 16 displays how hackers can capture passwords via sniffing and capturing packets.

Figure 16: Capturing username and passwords via Wireshark



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.