Channel address:
Categories:
Technologies
Language: English
Subscribers:
616
Description from channel
Learn all your hacking here. Best hackers in the world we train professionals and beginners
Use our bot to contact administrator to learn new tricks and any hacking you want to know contact us through our bot @hackersworldunite_bot
Ratings & Reviews
Reviews can be left only by registered users. All reviews are moderated by admins.
5 stars
0
4 stars
2
3 stars
0
2 stars
0
1 stars
1
The latest Messages 4
2022-06-12 12:05:00
SummaryNetwork sniffing is intercepting packages as they are transmitted over the network
Passive sniffing is done on a network that uses a hub. It is difficult to detect.
Active sniffing is done on a network that uses a switch. It is easy to detect.
MAC flooding works by flooding the MAC table address list with fake MAC addresses. This makes the switch to operate like a HUB
Security measures as outlined above can help protect the network against sniffing.
143 views09:05
2022-06-12 12:05:00
What is a MAC Flooding?
MAC flooding is a network sniffing technique that floods the switch MAC table with fake MAC addresses. This leads to overloading the switch memory and makes it act as a hub. Once the switch has been compromised, it sends the broadcast messages to all computers on a network. This makes it possible to sniff data packets as they sent on the network.
Counter Measures against MAC floodingSome switches have the port security feature. This feature can be used to limit the number of MAC addresses on the ports. It can also be used to maintain a secure MAC address table in addition to the one provided by the switch.
Authentication, Authorization and Accounting servers can be used to filter discovered MAC addresses.
Sniffing Counter MeasuresRestriction to network physical media highly reduces the chances of a network sniffer been installed
Encrypting messages as they are transmitted over the network greatly reduces their value as they are difficult to decrypt.
Changing the network to a Secure Shell (SSH)network also reduces the chances of the network been sniffed.
142 views09:05
2022-06-12 12:05:00
108 views09:05
2022-06-12 12:05:00
Just below the log entries, there is a panel with a summary of captured data. Look for the summary that says Line-based text data: application/x-www-form-urlencoded
107 views09:05
2022-06-12 12:00:25
126 views09:00
2022-06-12 12:00:25
Locate the Info column and look for entries with the HTTP verb POST and click on it
118 views09:00
2022-06-12 12:00:18
120 views09:00
2022-06-12 12:00:18
Filter for HTTP protocol results only using the filter textbox
116 views09:00
2022-06-12 12:00:18
115 views09:00
2022-06-12 12:00:17
Go back to Wireshark and stop the live capture
109 views09:00