SlideShare a Scribd company logo
Packet SniffingCompiled By -KunalThakurVishalShirguppiJustin FrancisShazia Ali
Packet sniffing is a technique of monitoring every packet that crosses the network.PACKET SNIFFERSHost AHost BRouter A Router B
Types of environments1. SHARED ETHERNET2. SWITCHED ETHERNET
Types of sniffing programs:Commercial packet sniffers.Underground packet sniffers
Uses of Packet SniffersCapturing clear-text usernames and passwordsCapturing and replaying Voice over IP telephone conversationsMapping a networkBreaking into a target computer and installing remotely controlled sniffing software.Redirecting communications to take a path that includes the intruder’s computer.Conversion of Network traffic into human readable form.Network analysis to find the bottlenecks.Network intrusion detection to monitor for attackers.
Sniffing Tools 1. tcpdump2. sniffit3. ethereal4. hunt5. dsniff6. Ip spoofing
Sniffing MethodSniffing method work’s in switched and non-switched network .Sniffing Methods-IP –Based sniffingMAC-Based SniffingARP-Based Sniffing
IP-Based SniffingThis is the original way of packet sniffing. It works by putting the network card into promiscuous mode and sniffing all packets matching the IP address filter. This method only works in non-switched networks.
With the help of this tool u can do -Perform batch and continuous pings on multiple servers.Lookup IP address for a single or list of domain names and vice versa.Find out the country associated with a single or list of domains or IP addresses. Trace IP addresses to their destination and investigate connection problems.Allow you to scan any given web site and produce a list of links (including htmcgiphp asp jsp jpg gif mp3 mpeg exe zip rarswf and more file tyies) found in the site, using several criteria to filter the results. Monitor all the TCP/IP connections from your computer to the internet automatically;
MAC-Based SniffingThis method works by putting the network card into promiscuous mode and sniffing all packets matching the MAC address filter.
ARP-Based SniffingThis method works a little different. It doesn’t put the network card into promiscuous mode. This isn’t necessary because ARP packets will be sent to us.This happens because the ARP protocol is stateless. Because of this, sniffing can be done on a switched network. To perform this kind of sniffing, you first have to poison the ARP cache1 of the two hosts that you want to sniff, identifying yourself as the other host in the connection. Once the ARP caches are poisoned, the two hosts start their connection, but instead of sending the traffic directly to the other host it gets sent to us
Man In Middle Attack
AssumptionsOne assumption we have made is that the sniffer is an actual sniffer program running on a host. i.e we disallow the possibility that the sniffer is a dedicated device that a hacker physically attaches to the network. a lot of break-ins are done remotely by hackers with no physical access to the network whatsoever. Usually, a UNIX machine is broken in to , and the hacker logs on to the compromised machine and installs a sniffer with root access.
AssumptionsThe network segment which we wish to detect whether a sniffer is running or not, is an Ethernet segment. we also assume that TCP/IP is the protocol that the network is using. Although some of our techniques can be modified  to support other networking protocols, the implementation is based on TCP/IP since it is, by far, the most popular network protocol today.
ANTI-SNIFF DETECTION METHODS:MAC DETECTION MAC detection running on a Ethernet segment requires that the machine running the detector be on the same Ethernet segment as the host that is suspected of running a sniffer.This technique allows remote detection of sniffers on the same Ethernet segment, but not the remote detection of sniffers across different networks .
1.1 Ethernet Network Interface Cards:All network interface cards (NIC) can be uniquely identified by its MAC address. Ethernet controller chips implement a filter which filters out any packet that does not contain a target MAC address for the NIC Since sniffers are interested in all traffic on the Ethernet segment, NICs provide a promiscuous mode.In promiscuous mode, all Ethernet data packets, regardless of the target MAC address, are passed to the operating system.
Packet sniffers
1.2 TCP/IP on Ethernet:Ethernet protocol standard, IEEE 802.3, specifies the Ethernet packet structure where an IP packet encapsulated in a Ethernet packet. For TCP/IP, a normal IP packet destined to a particular Ethernet host has the destination host's MAC address filled in the Ethernet header and the IP address of the destination  filled in the IP header.
Implementation:The tool generates the full ICMP packet as well as the outer Ethernet packet that encapsulates the ICMP packet. Ethernet packet is generated such that the target MAC address is different from the actual MAC address of the target machine.So, for any suspected host on the Ethernet segment, the tool can generate the ICMP Echo Request with incorrect MAC address and check if a ICMP Echo Reply is returned.If so, the suspected host is in promiscuous mode. Thus, a sniffer could likely be running on that host.
Results :The MAC detection technique works only against operating systems with a TCP/IP protocol stack that does not have the check against correct MAC addresses. Linux 2.0.35 is vulnerable to this kind of sniffer detection. FreeBSD 2.2.7 is not vulnerable to this kind of sniffer detection. The networking code in FreeBSD 2.2.7 correctly implements the necessary check so that incorrectly addressed Ethernet packets never reach the ICMP processing code.
DNS DetectionThe DNS detection technique exploits a behavior common in all password sniffers to date. This technique requires that the system administrator controls the domain name space
Exploit Sniffer Behaviour1.Since this traffic is generated by the sniffer program, the trick is to detect this DNS lookup from normal DNS lookup requests. 2. We can generate fake traffic to the Ethernet segment with a source address of some unused IP address that we provide the DNS service for.
ImplementationThe tool that implement this technique runs on the machine to provide the reverse DNS lookup for the trigger IP address. The tool generates a fake FTP connection with the source IP address set to the trigger IP address. Then, the tool waits for a period of user definable time on the DNS service port. When the time expires, the tool reports the number of DNS request counted.
Considering the two cases hereIf the fake FTP traffic ends up being destined to a real machine on the network, then if we count two or more DNS lookups, a  sniffer is probably running on the networkThe other case is that the fake traffic ends up being destined to no particular machine on the network. Then, if one or more DNS lookup occurs, there is most likely a sniffer on the network.
RESULTThe DNS detection technique was able to detect sniffers running on a Ethernet segment with 100% accuracy regardless of operating system type.
DNS Detection:
ConclusionPacket sniffers can capture things like clear-text passwords and usernames or other sensitive material. Packet sniffers are a serious matter for network security. Since sniffing is possible on non-switched and switched networks, it’s a good practice to encrypt your data communications.
Special Thanks to: Prof. Sunil SurveMr.AjayKoli

More Related Content

PPTX
Packet sniffing
Shyama Bhuvanendran
 
PPTX
Internship Presentation 2 Web Developer
Hemant Sarthak
 
PPTX
Advanced persistent threat (apt)
mmubashirkhan
 
PPTX
IP Spoofing
Akmal Hussain
 
PPTX
Smart Card Security
Reben Dalshad
 
DOCX
Packet sniffer repot
Kunal Thakur
 
PPTX
Man in the middle attack (mitm)
Hemal Joshi
 
PPT
Open Source Technology
priyadharshini murugan
 
Packet sniffing
Shyama Bhuvanendran
 
Internship Presentation 2 Web Developer
Hemant Sarthak
 
Advanced persistent threat (apt)
mmubashirkhan
 
IP Spoofing
Akmal Hussain
 
Smart Card Security
Reben Dalshad
 
Packet sniffer repot
Kunal Thakur
 
Man in the middle attack (mitm)
Hemal Joshi
 
Open Source Technology
priyadharshini murugan
 

What's hot (20)

PPTX
Packet sniffers
Ravi Teja Reddy
 
PPTX
Packet Sniffer
vilss
 
PPTX
PACKET Sniffer IMPLEMENTATION
Goutham Royal
 
PPTX
Honeypots
SARANYA S
 
PPTX
Basics of Denial of Service Attacks
Hansa Nidushan
 
PPT
Packet Sniffing
guestfa1226
 
PPTX
Network forensic
Manjushree Mashal
 
PPTX
Ethical Hacking - sniffing
Bhavya Chawla
 
PPTX
Intrusion detection system
Akhil Kumar
 
PPTX
Ip spoofing ppt
Anushakp9
 
PPTX
security and privacy-Internet of things
sreelekha appakondappagari
 
PPTX
iSCSI (Internet Small Computer System Interface)
Sayali Koranne
 
PPTX
Network address translation
Varsha Honde
 
PPT
Proxy servers
Kumar
 
PPTX
IP addressing and Subnetting PPT
Pijush Kanti Das
 
PPS
Ip address
Amandeep Kaur
 
PDF
Cisco Internetworking Operating System (ios)
Netwax Lab
 
PPTX
Ppt of routing protocols
Bhagyashri Dhoke
 
PPT
DDoS Attacks
Jignesh Patel
 
PDF
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
Packet sniffers
Ravi Teja Reddy
 
Packet Sniffer
vilss
 
PACKET Sniffer IMPLEMENTATION
Goutham Royal
 
Honeypots
SARANYA S
 
Basics of Denial of Service Attacks
Hansa Nidushan
 
Packet Sniffing
guestfa1226
 
Network forensic
Manjushree Mashal
 
Ethical Hacking - sniffing
Bhavya Chawla
 
Intrusion detection system
Akhil Kumar
 
Ip spoofing ppt
Anushakp9
 
security and privacy-Internet of things
sreelekha appakondappagari
 
iSCSI (Internet Small Computer System Interface)
Sayali Koranne
 
Network address translation
Varsha Honde
 
Proxy servers
Kumar
 
IP addressing and Subnetting PPT
Pijush Kanti Das
 
Ip address
Amandeep Kaur
 
Cisco Internetworking Operating System (ios)
Netwax Lab
 
Ppt of routing protocols
Bhagyashri Dhoke
 
DDoS Attacks
Jignesh Patel
 
Introduction to Software Defined Networking (SDN)
Bangladesh Network Operators Group
 
Ad

Viewers also liked (20)

PPTX
Sniffer ppt
Rajashree Praharaj
 
ODP
Sniffer
Stelcy Jose
 
PPTX
Sniffer for detecting lost mobile ppt
asmita tarar
 
PPTX
Sniffer for Detecting Lost Mobile
Seminar Links
 
PPTX
Sniffer for the mobile phones
Upender Upr
 
PPTX
Packet sniffing in switched LANs
Ishraq Al Fataftah
 
PPTX
Sniffer for detecting lost mobiles
akhila immadisetty
 
PPTX
Sniffer for detecting lost mobiles
Abhishek Abhi
 
PPT
Module 5 Sniffers
leminhvuong
 
PDF
Packet sniffing & ARP Poisoning
Viren Rao
 
PPTX
Digital Scent Technology
Jyoti Chintadi
 
PPTX
Skinput technology
Fenil Wakawala
 
PPT
Pill camera
Joyce Thomas
 
PPT
Ip Spoofing
arpit.arp
 
PPS
Sniffers
JErickPPTs
 
PDF
Sniffing via dsniff
Kshitij Tayal
 
PPT
Network Security Threats and Solutions
Colin058
 
DOCX
Packet sniffers
Wanwen Wen
 
PPTX
Session hijacking
Gayatri Kapse
 
PDF
Ceh v8 labs module 08 sniffers
Asep Sopyan
 
Sniffer ppt
Rajashree Praharaj
 
Sniffer
Stelcy Jose
 
Sniffer for detecting lost mobile ppt
asmita tarar
 
Sniffer for Detecting Lost Mobile
Seminar Links
 
Sniffer for the mobile phones
Upender Upr
 
Packet sniffing in switched LANs
Ishraq Al Fataftah
 
Sniffer for detecting lost mobiles
akhila immadisetty
 
Sniffer for detecting lost mobiles
Abhishek Abhi
 
Module 5 Sniffers
leminhvuong
 
Packet sniffing & ARP Poisoning
Viren Rao
 
Digital Scent Technology
Jyoti Chintadi
 
Skinput technology
Fenil Wakawala
 
Pill camera
Joyce Thomas
 
Ip Spoofing
arpit.arp
 
Sniffers
JErickPPTs
 
Sniffing via dsniff
Kshitij Tayal
 
Network Security Threats and Solutions
Colin058
 
Packet sniffers
Wanwen Wen
 
Session hijacking
Gayatri Kapse
 
Ceh v8 labs module 08 sniffers
Asep Sopyan
 
Ad

Similar to Packet sniffers (20)

PPTX
Packet capturing
PankajSingh1035
 
PPTX
Packet sniffing in LAN
Arpit Suthar
 
PPT
Week 10 - Packet Sssdssssssssniffers.ppt
fzbshf
 
PPTX
packet sniffing with Wireshark and its implementation.pptx
RohitAhuja58
 
PPTX
Unit 3:Enterprise Security
prachi67
 
PDF
Commands used in Assessing Network layout & Security
LearningwithRayYT
 
PDF
Ceh v5 module 07 sniffers
Vi Tính Hoàng Nam
 
PPTX
Slides on Security issues in TCP/IP Clear explanation
dkesavaraja
 
PPTX
Main Protocols on the network layer of OSI model
akbarshah9596
 
PDF
Internet census 2012
Giuliano Tavaroli
 
PPTX
Scanning and Enumeration in Cyber Security.pptx
MahdiHasanSowrav
 
PDF
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
IJNSA Journal
 
DOCX
For your final step, you will synthesize the previous steps and la
ShainaBoling829
 
PPSX
Node finder presentation
Varun Varshney
 
PPTX
Wiretapping
Mr Cracker
 
PPT
Network monotoring
Programmer
 
PPT
Nnnnnn
nautami
 
PPTX
Nmap & Network sniffing
Mukul Sahu
 
Packet capturing
PankajSingh1035
 
Packet sniffing in LAN
Arpit Suthar
 
Week 10 - Packet Sssdssssssssniffers.ppt
fzbshf
 
packet sniffing with Wireshark and its implementation.pptx
RohitAhuja58
 
Unit 3:Enterprise Security
prachi67
 
Commands used in Assessing Network layout & Security
LearningwithRayYT
 
Ceh v5 module 07 sniffers
Vi Tính Hoàng Nam
 
Slides on Security issues in TCP/IP Clear explanation
dkesavaraja
 
Main Protocols on the network layer of OSI model
akbarshah9596
 
Internet census 2012
Giuliano Tavaroli
 
Scanning and Enumeration in Cyber Security.pptx
MahdiHasanSowrav
 
AN ACTIVE HOST-BASED INTRUSION DETECTION SYSTEM FOR ARP-RELATED ATTACKS AND I...
IJNSA Journal
 
For your final step, you will synthesize the previous steps and la
ShainaBoling829
 
Node finder presentation
Varun Varshney
 
Wiretapping
Mr Cracker
 
Network monotoring
Programmer
 
Nnnnnn
nautami
 
Nmap & Network sniffing
Mukul Sahu
 

Recently uploaded (20)

PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
Virus sequence retrieval from NCBI database
yamunaK13
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PDF
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
PPTX
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PPTX
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
Virus sequence retrieval from NCBI database
yamunaK13
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Health-The-Ultimate-Treasure (1).pdf/8th class science curiosity /samyans edu...
Sandeep Swamy
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
Dakar Framework Education For All- 2000(Act)
santoshmohalik1
 
CARE OF UNCONSCIOUS PATIENTS .pptx
AneetaSharma15
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Information Texts_Infographic on Forgetting Curve.pptx
Tata Sevilla
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Introduction to pediatric nursing in 5th Sem..pptx
AneetaSharma15
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 

Packet sniffers

  • 1. Packet SniffingCompiled By -KunalThakurVishalShirguppiJustin FrancisShazia Ali
  • 2. Packet sniffing is a technique of monitoring every packet that crosses the network.PACKET SNIFFERSHost AHost BRouter A Router B
  • 3. Types of environments1. SHARED ETHERNET2. SWITCHED ETHERNET
  • 4. Types of sniffing programs:Commercial packet sniffers.Underground packet sniffers
  • 5. Uses of Packet SniffersCapturing clear-text usernames and passwordsCapturing and replaying Voice over IP telephone conversationsMapping a networkBreaking into a target computer and installing remotely controlled sniffing software.Redirecting communications to take a path that includes the intruder’s computer.Conversion of Network traffic into human readable form.Network analysis to find the bottlenecks.Network intrusion detection to monitor for attackers.
  • 6. Sniffing Tools 1. tcpdump2. sniffit3. ethereal4. hunt5. dsniff6. Ip spoofing
  • 7. Sniffing MethodSniffing method work’s in switched and non-switched network .Sniffing Methods-IP –Based sniffingMAC-Based SniffingARP-Based Sniffing
  • 8. IP-Based SniffingThis is the original way of packet sniffing. It works by putting the network card into promiscuous mode and sniffing all packets matching the IP address filter. This method only works in non-switched networks.
  • 9. With the help of this tool u can do -Perform batch and continuous pings on multiple servers.Lookup IP address for a single or list of domain names and vice versa.Find out the country associated with a single or list of domains or IP addresses. Trace IP addresses to their destination and investigate connection problems.Allow you to scan any given web site and produce a list of links (including htmcgiphp asp jsp jpg gif mp3 mpeg exe zip rarswf and more file tyies) found in the site, using several criteria to filter the results. Monitor all the TCP/IP connections from your computer to the internet automatically;
  • 10. MAC-Based SniffingThis method works by putting the network card into promiscuous mode and sniffing all packets matching the MAC address filter.
  • 11. ARP-Based SniffingThis method works a little different. It doesn’t put the network card into promiscuous mode. This isn’t necessary because ARP packets will be sent to us.This happens because the ARP protocol is stateless. Because of this, sniffing can be done on a switched network. To perform this kind of sniffing, you first have to poison the ARP cache1 of the two hosts that you want to sniff, identifying yourself as the other host in the connection. Once the ARP caches are poisoned, the two hosts start their connection, but instead of sending the traffic directly to the other host it gets sent to us
  • 12. Man In Middle Attack
  • 13. AssumptionsOne assumption we have made is that the sniffer is an actual sniffer program running on a host. i.e we disallow the possibility that the sniffer is a dedicated device that a hacker physically attaches to the network. a lot of break-ins are done remotely by hackers with no physical access to the network whatsoever. Usually, a UNIX machine is broken in to , and the hacker logs on to the compromised machine and installs a sniffer with root access.
  • 14. AssumptionsThe network segment which we wish to detect whether a sniffer is running or not, is an Ethernet segment. we also assume that TCP/IP is the protocol that the network is using. Although some of our techniques can be modified to support other networking protocols, the implementation is based on TCP/IP since it is, by far, the most popular network protocol today.
  • 15. ANTI-SNIFF DETECTION METHODS:MAC DETECTION MAC detection running on a Ethernet segment requires that the machine running the detector be on the same Ethernet segment as the host that is suspected of running a sniffer.This technique allows remote detection of sniffers on the same Ethernet segment, but not the remote detection of sniffers across different networks .
  • 16. 1.1 Ethernet Network Interface Cards:All network interface cards (NIC) can be uniquely identified by its MAC address. Ethernet controller chips implement a filter which filters out any packet that does not contain a target MAC address for the NIC Since sniffers are interested in all traffic on the Ethernet segment, NICs provide a promiscuous mode.In promiscuous mode, all Ethernet data packets, regardless of the target MAC address, are passed to the operating system.
  • 18. 1.2 TCP/IP on Ethernet:Ethernet protocol standard, IEEE 802.3, specifies the Ethernet packet structure where an IP packet encapsulated in a Ethernet packet. For TCP/IP, a normal IP packet destined to a particular Ethernet host has the destination host's MAC address filled in the Ethernet header and the IP address of the destination filled in the IP header.
  • 19. Implementation:The tool generates the full ICMP packet as well as the outer Ethernet packet that encapsulates the ICMP packet. Ethernet packet is generated such that the target MAC address is different from the actual MAC address of the target machine.So, for any suspected host on the Ethernet segment, the tool can generate the ICMP Echo Request with incorrect MAC address and check if a ICMP Echo Reply is returned.If so, the suspected host is in promiscuous mode. Thus, a sniffer could likely be running on that host.
  • 20. Results :The MAC detection technique works only against operating systems with a TCP/IP protocol stack that does not have the check against correct MAC addresses. Linux 2.0.35 is vulnerable to this kind of sniffer detection. FreeBSD 2.2.7 is not vulnerable to this kind of sniffer detection. The networking code in FreeBSD 2.2.7 correctly implements the necessary check so that incorrectly addressed Ethernet packets never reach the ICMP processing code.
  • 21. DNS DetectionThe DNS detection technique exploits a behavior common in all password sniffers to date. This technique requires that the system administrator controls the domain name space
  • 22. Exploit Sniffer Behaviour1.Since this traffic is generated by the sniffer program, the trick is to detect this DNS lookup from normal DNS lookup requests. 2. We can generate fake traffic to the Ethernet segment with a source address of some unused IP address that we provide the DNS service for.
  • 23. ImplementationThe tool that implement this technique runs on the machine to provide the reverse DNS lookup for the trigger IP address. The tool generates a fake FTP connection with the source IP address set to the trigger IP address. Then, the tool waits for a period of user definable time on the DNS service port. When the time expires, the tool reports the number of DNS request counted.
  • 24. Considering the two cases hereIf the fake FTP traffic ends up being destined to a real machine on the network, then if we count two or more DNS lookups, a sniffer is probably running on the networkThe other case is that the fake traffic ends up being destined to no particular machine on the network. Then, if one or more DNS lookup occurs, there is most likely a sniffer on the network.
  • 25. RESULTThe DNS detection technique was able to detect sniffers running on a Ethernet segment with 100% accuracy regardless of operating system type.
  • 27. ConclusionPacket sniffers can capture things like clear-text passwords and usernames or other sensitive material. Packet sniffers are a serious matter for network security. Since sniffing is possible on non-switched and switched networks, it’s a good practice to encrypt your data communications.
  • 28. Special Thanks to: Prof. Sunil SurveMr.AjayKoli