Packet sniffing is a form of wire-tapping applied to computer networks. It came into vogue with Ethernet; this means that traffic on a segment passes by all hosts attached to that segment. Ethernet cards have a filter that prevents the host machine from seeing traffic address to other stations. Sniffing programs turn off the filter, and thus see everyone traffic. Most of the hubs/switches allow the inducer to sniff remotely using SNMP, which has weak authentication. Using POP, IMAP, HTTP Basic, and talent authentication, an intruder reads the password off the wire in cleartext.
To be an expert ethical hacker and penetration tester, you must have sound knowledge of sniffing network packets, performing ARP poisoning, spoofing the network, and DNS poisoning. OmniPeek network analysis performs deep packet inspection, network forensics, troubleshooting, and packet and protocol analysis of wired and wireless networks. In this lab, we discuss wireless packet analysis of captured packets.
The objective of this lab is to reinforce concepts of network security policy, policy enforcement, and policy audits.
In this lab, you have learnt how to reinforce concepts of network security policy, policy enforcement, and policy audits. Document the BSSID of the target wireless network connected clients and recovered WEP key. Analyze various Airecrack-ng attacks and their respective data packet generation rate.