Saturday, May 4, 2024
Home What is What is Network sniffing and their types ?

What is Network sniffing and their types ?

The network Sniffing is a process of monitoring and capturing all data packets through a given network. The main function performed by sniffing is the network/system administrator which can monitor and troubleshoot the network traffic. The attackers use the sniffers to capture the data packets that contain sensitive information like password, account information, etc. The sniffers may be hardware or software installed in the system. A packet sniffers on a network in the promiscuous mode that malicious things can be captured and analyzed all the network traffic.

There are mainly two types :

Active Sniffing:

active Sniffers
active Sniffers

When we talk about the active sniffing. A switch is a point to point network device The switch plays an important role in the flow of data between its ports which actively monitor the MAC address on each port that helps to pass the data only to its intended target. If you want to capture the traffic between the target sniffers which has actively injected traffic into the LAN to enable sniffing of the traffic. You can do it in various ways.

Passive Sniffing :

passive sniffers
Passive sniffers

The process of sniffing through the hub where any traffic that is passed through the non-switched or unabridged network segment which can be seen by all machines on that segment.

Sniffers operate at the data link layer of the network. Any data which sent across the LAN is actually sent to each and every machine connected to the LAN. The passive sniffers wait for the data to be sent and captured.

Found this article informative? Follow Vednam on Facebook, Twitter, Mix, Tumbler, and Linkedin to know more exclusive content we post.

Bipin Choudharyhttps://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...

Recent Comments