嗅探器的基础知识与检测翻译.doc
《嗅探器的基础知识与检测翻译.doc》由会员分享,可在线阅读,更多相关《嗅探器的基础知识与检测翻译.doc(20页珍藏版)》请在咨信网上搜索。
1、SJ0201-2016版 本科毕业论文(设计) 英 文 翻 译 嗅探器的基础知识与检测学 院xxx 姓 名xxx专 业xxx班 级xxx学 号xxxSniffers Basics and DetectionPrefaceThis is the first version of my article titled “Sniffers Basics and Detection”. I have tried to explain in a very simple way what Sniffers are, how they work, methods of detecting sniffers,
2、various sniffing tools and finally how to protect against sniffers.The reason I wrote this document was the fact when I started trying out sniffers, there was not a single document that covered this topic comprehensively.This article is a work in progress. I keep adding material as and when requeste
3、d by users. I am planning to add another section on using the various sniffing tools that are mentioned in this article.I would love to hear from you, specifically if you want more details to be added to this document. Are there any doubts/queries of yours that this article didnt clear up? Do you wa
4、nt more information on a particular topic? If yes, please mail me. I would love to hear from you and help you if possible. Your comments, suggestions and criticisms about this article are welcome. And finally, this article is dedicated to my good friend GVS Karthik (Nange as we used to call him in I
5、IT).Sniffers: Basics and Detection“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.
6、” IntroductionA sniffer is a program or a device that eavesdrops on the network traffic by grabbing information traveling over a network. Sniffers basically are Data Interception technology. They work because the Ethernet was built around a principle of sharing. Most networks use broadcast technolog
7、y wherein messages for one computer can be read by another computer on that network. In practice, all the other computers except the one for which the message is meant, will ignore that message. However,computers can be made to accept messages even if they are not meant for them. This is done by mea
8、ns of a Sniffer! Many people assume computers connected to a switch are safe. Nothing could be further from the truth. Computers connected to switches are just as vulnerable to sniffing as those connected to a hub. This article seeks to explore the topic of sniffers, how they work, detecting and pro
9、tecting your assets against the malicious use of these programs. Finally, towards the end we will talk about some commonly available sniffers.How A Sniffer WorksA computer connected to the LAN has two addresses. One is the MAC (Media Access Control) address that uniquely identifies each node in a ne
10、twork and is stored on the network card itself. It is the MAC address that gets used by the Ethernet protocol while building “frames” to transfer data to and from a machine. The other is the IP address, which is used by applications. The Data Link Layer uses an Ethernet header with the MAC address o
11、f the destination machine rather than the IP Address. The Network Layer is responsible for mapping IP network addresses to the MAC address as required by the Data Link Protocol. It initially looks up the MAC address of the destination machine in a table, usually called the ARP (Address Resolution Pr
12、otocol) cache. If no entry is found for the IP address, the Address Resolution Protocol broadcasts a request packet (ARP request) to all machines on the network. The machine with that address responds to the source machine with its MAC address. This MAC address then gets added to the source machines
13、 ARP Cache. The source machine in all its communications with the destination machine then uses this MAC address. There are two basic types of Ethernet environments and how sniffers work in both these cases is slightly different. Shared Ethernet: In a shared Ethernet environment, all hosts are conne
14、cted to the same bus and compete with one another for bandwidth. In such an environment packets meant for one machine are received by all the other machines. Thus when a machine Venus(Comp 1) wants to talk to Cupid (Comp 2) in such an environment, it sends a packet on the network with the destinatio
15、n MAC address of Cupid along with its own source MAC address. All the computers on the shared Ethernet (Comp 3 and Comp 4) compare frames destination MAC address with their own. If the two dont match, the frame is quietly discarded. A machine running a sniffer breaks this rule and accepts all frames
16、. Such a machine is said to have been put into promiscuous mode and can effectively listen to all the traffic on the network.Sniffing in a Shared Ethernet environment is totally passive and hence extremely difficult to detect.Figure 1: A Shared Ethernet Network Packets from Comp 1, meant for Comp 2
17、are received by both Comp 3 and Comp 4. But under normal circumstances they reject the packets as the MAC address in the packet does not match their MAC address. But if either of these computers is put in promiscuous mode, they can capture the entire communication between Comp 1 and Comp2 Switched E
18、thernet: An Ethernet environment in which the hosts are connected to switch instead of a hub is called a Switched Ethernet. The switch maintains a table keeping track of each computers MAC address and the physical port on the switch to which that MAC address is connected and delivers packets destine
19、d for a particular machine correspondingly. The switch is an intelligent device that sends packets to the destined computer only and does not broadcast it to all the machines on the network, as in the previous case. This results in better utilization of the available bandwidth and improved security.
20、 Hence the process followed earlier, of putting the machine into promiscuous mode, to gather packets does not work. As a result of this, even many experienced Systems Administrators fall into the belief that switched networks are totally secure and immune to sniffing. Sadly, this is not really true.
21、Figure 2: A Switched NetworkIn a switched network, packets from Comp 1 meant for Comp 2 are not received by other terminals connected to the switch. Even if the Comp 3 and Comp 4 are in promiscuous mode, they will yet not be able to see the traffic between Comp 1 and Comp 2.Though a switch is more s
22、ecure than a hub, the following methods can still be used to sniff on a switch:1ARP Spoofing: We have explained earlier how ARP is used to obtain the MAC address of the destination machine with which we wish to communicate. The ARP is stateless, you can send an ARP reply even if one has not been ask
23、ed for and such a reply will be accepted. Ideally when you want to sniff the traffic originating from machine Venus, you can ARP Spoof the gateway of the network. The ARP cache of Venus will now have a wrong entry for the gateway and is said to be poisoned. This way all the traffic destined for the
24、gateway will pass through your machine. Another trick that can be used is to poison a hosts ARP cache by setting the gateways MAC address to FF:FF:FF:FF:FF:FF (also known as the broadcast MAC). An excellent tool for this is the arpspoof utility that comes with the dsniff suite. Using arpspoof to poi
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 嗅探器 基础知识 检测 翻译
1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前自行私信或留言给上传者【a199****6536】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时私信或留言给本站上传会员【a199****6536】,需本站解决可联系【 微信客服】、【 QQ客服】,若有其他问题请点击或扫码反馈【 服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【 版权申诉】”(推荐),意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:4008-655-100;投诉/维权电话:4009-655-100。