Page 95 - StudyBook.pdf
P. 95

General Security Concepts: Attacks • Chapter 2  79

                 Sniffing and Eavesdropping


                 Sniffing means eavesdropping on a network.A sniffer is a tool that enables a
                 machine to see all packets that are passing over the wire (or through the air on a
                 wireless network), even the ones not destined for that host.This is a very powerful
                 technique for diagnosing network problems, but it can also be used maliciously to
                 scan for passwords, e-mail, or any other type of data sent in the clear. For sniffing to
                 function, the network card has to be configured in promiscuous mode (which allows
                 it to process all packets on the wire) by the sniffer program.Tcpdump is the most
                 common UNIX sniffing tool, and comes with many Linux distributions. Snoop is
                 the Solaris equivalent.These two programs are command-line-based, and will
                 simply begin dumping all of the packets they see, in a readable format.They are
                 fairly basic in their functionality, but can be used to gain information about
                 routing, hosts, and traffic types. For more detailed command-line scanning,
                 WireShark from www.wireshark.org is a fully graphical sniffing program that has
                 many advanced features. One of the more powerful features of WireShark is the
                 ability to reassemble TCP streams and sessions.After capturing an amount of data,
                 an attacker can easily reassemble Web pages viewed, files downloaded, or e-mail
                 sent, all with the click of the mouse.The threat from sniffing is yet another argu-
                 ment for the use of encryption to protect any kind of sensitive data on a network.
                    Another type of eavesdropping relies on the use of keyloggers.These are pro-
                 grams that run hidden in the OS, and record all keys typed by the user. Password,
                 accounts, usernames, and more can be discovered with a keylogger running on an
                 unsuspecting machine. Some keyloggers even take screenshots at regular intervals
                 and send them to the owner of the program (or attacker).To protect against key-
                 loggers, you should regularly run an anti-virus and anti-spyware program on
                 desktop computers.


                 Password Attacks

                 Password attacks are extremely common, as they are easy to perform and often
                 result in a successful intrusion.There are two basic types of password guessing that
                 can be performed: brute force or dictionary-based attacks. Each of these methods is
                 explained in detail in the following sections. Remember that the simplest password
                 attack is just guessing passwords. If the attacker knows the victim well, the use of
                 personal information like birthdays, children’s names, pets, and hobbies can be used
                 to make educated guesses.Always create a password that cannot be associated with
                 yourself.



                                                                              www.syngress.com
   90   91   92   93   94   95   96   97   98   99   100