Question

In: Computer Science

Discuss how you will address the challenges of sniffing on a switched network in the testing...

Discuss how you will address the challenges of sniffing on a switched network in the testing process.

Solutions

Expert Solution

Sniffing is the process of monitoring and capturing all data packets that are passing through a computer network using packet sniffers. Packets sniffers are used by networks administrator to keep track of data traffic passing through their networks. These are called network protocol analyzers.

These are differnt types of sniffers tools used and they include :-

  • Wireshark
  • Ettercap
  • BetterCAP
  • Tcpdump
  • WinDump etc

There are two type of sniffing:-

  1. Active Sniffing
  2. Passive Sniffing

1. Active Sniffing:- Active Sniffing is conducted on a switched networks. A switch is a device that connect two network device together. Switch use to the media access control (MAC) address to forward information to their intended destination port.

2. Passive Sniffing:- Passive sniffing uses hubs insted of Switches. hub performed the same way as switches only that they do use MAC address to read the destination port of data.


Related Solutions

Discuss the architecture and technologies that make up the PSTN (Public Switched Telephone Network).
Discuss the architecture and technologies that make up the PSTN (Public Switched Telephone Network).
You have network address as 192.1.1.0/24. Subnet it into /27 network.
You have network address as 192.1.1.0/24. Subnet it into /27 network.
a- Explain the role of packet sniffing and protocol analyzers as used in network firewalls b-...
a- Explain the role of packet sniffing and protocol analyzers as used in network firewalls b- Explain the role of packet sniffing and protocol analyzers as used in intrusion detection systems c-List and specifically describe the 802.x Ethernet frame header fields that would be important to Network Forensic analysis d- List and specifically describe the 802.x Wireless Ethernet frame header fields that would be important to Network Forensic analysis
Give the similarities between network sniffing and wiretapping ? Why are they considered as passive threats...
Give the similarities between network sniffing and wiretapping ? Why are they considered as passive threats ?
If you have a network with 300 computers explain how you would setup an IP address...
If you have a network with 300 computers explain how you would setup an IP address scheme to meet the needs of the network (draw this if necessary) If you get a computer that has the wrong IP address and is assigned via DHCP how can you get a new address? Answer for command line and gui. What does it mean when you get a 169.x.x.x address?
What interventions would you recommend to address the challenges at Red Carpet? How will you implement...
What interventions would you recommend to address the challenges at Red Carpet? How will you implement the interventions in the organization? How will you evaluate the success of the change process at Red Carpet? What would you recommend Red Carpet do next after the change process is completed?
How will you, as a future health system leader, address the identified community and constituency challenges?
How will you, as a future health system leader, address the identified community and constituency challenges?
Given an IP address 138.112.25.60, with the mask 255.255.255.240: Calculate the network address and broadcast address...
Given an IP address 138.112.25.60, with the mask 255.255.255.240: Calculate the network address and broadcast address of the network it belongs to. For 138.112.25.47 and 38.112.25.49, which one is in the same network as 138.112.25.60 does, and which one is not. Show the necessary calculation steps and explanation.
In packet switched network, store and forward refers to transmitting packet to the next link after...
In packet switched network, store and forward refers to transmitting packet to the next link after entire packet arrives at router scheduling of packet transmission to avoid congestion transmitting packet to the next link while router is receiving the packet    storing entire packet at router until acknowledgment is received Which of the following HTTP methods allows a user to upload an object to a specific path on a Web server? HEAD GET PUT POST Which of the following is NOT...
Find the network address, the direct broadcast address, and the number of addresses in a block;...
Find the network address, the direct broadcast address, and the number of addresses in a block; if one of the addresses in this block is 175.120.240.17/19
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT