Category: wireshark
-
What and How : Cain & Abel
Cain and Abel is a password recovery tool that is often used in the field of cybersecurity. It is primarily designed for Microsoft Windows operating systems and has functionalities related to network analysis and password cracking. Here are some key aspects of Cain and Abel: It’s important to note that while Cain and Abel has…
-
Information Gathering
Learning Objectives Recommended tools Note: IP/domain shown below are for example purpose only . Step 1: Host Discovery – Ping sweep Perform a ping sweep (not a port scan) on the entire netblock and write down the discovered hosts. Ping sweepings can be performed in many ways. The Nmap command is the following: Note: You can also use other tools, such…
-
Man-in-the-middle Attack
A Man-in-the-Middle (MitM) attack is a form of cyber attack where an attacker intercepts and potentially alters the communication between two parties without their knowledge. The attacker positions themselves between the communicating parties, allowing them to eavesdrop on or manipulate the data being exchanged. Here’s how a typical MitM attack works: The working of a…
-
ARP Poisoning
ARP (Address Resolution Protocol) poisoning, also known as ARP spoofing, is a network attack in which an attacker sends false (spoofed) Address Resolution Protocol messages to the local area network. The goal of ARP poisoning is to associate the attacker’s MAC address with the IP address of another device on the network. This can lead…
-
MAC Flooding: Understanding the Attack
MAC flooding is a network attack that exploits the limitations of network switches by flooding the switch’s MAC address table. This attack aims to overload the table, causing the switch to operate in a less secure and more broadcast-heavy mode. Here’s a breakdown of MAC flooding with examples: Understanding MAC Flooding: Example Scenario: 1. Attacker…
-
What is Sniffing ?
Network Sniffing: A Comprehensive Explanation Network sniffing refers to the practice of intercepting and inspecting data packets as they flow across a computer network. This process is often conducted for legitimate network monitoring and troubleshooting purposes, but it can also be exploited for malicious activities if used without proper authorization. Key Aspects of Network Sniffing:…