○ Collation
This article was written one year ago and was not completed for some reason. Today, I sorted out shadowstar's home and accidentally found this unfinished article. Although it was a year ago, it is still not out of date and should be helpful to anyone who wants to know sniffer. My father said that everything should start and end. Today is the Dragon Boat Festival. I would like to send a message to my loved ones who are far away from each ot
Article title: sniffer for original socket dialysis. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
As you know, Ethernet adopts the broadcast mechanism. all workstations connected to the network can see the data transmitted over the network. Check the target address in
Sniffer this code I have written last year, this semester is not very busy, conveniently review the network, and then try to write again.
In fact, when writing a sniffer, the main thing is to set the NIC to promiscuous mode. On this basis, the captured packets are analyzed.
This is my written effect diagram, currently only convenient to view, even the menu is not added:
The left side of the interface s
remembers the Mac of a port by receiving data from this port and remembering its source Mac, like a machine's IP corresponding to the MAC's ARP list, the switch maintains a physical port with a Mac table, so the switch can be spoofed. Can send a package to set the source Mac is the Mac you want to receive the machine, then the switch will put your machine's network cable plug the physical port and that Mac corresponds to, and later sent to the Mac package sent to your network cable
, workstation A does not capture data belonging to workstation B, but simply ignores the data ). If the network interface of a workstation is in the hybrid mode (the concept of the hybrid mode will be explained later), it can capture all the packets and frames on the network.2. Network Monitoring PrinciplesThe sniffor program is a tool that uses the Ethernet characteristics to set the network adapter (NIC, usually Ethernet Card) to the messy (promiscuous) mode. Once the same card is set to this
From -- http://blog.csdn.net/zhangnn5/article/details/6810347
Reading this articleArticleBefore that, I suppose you already know the TCP/IP protocol, ARP protocol, What Is sniffer, and other basic network knowledge.In a General Lan, there are usually two access methods, one is hub access (The Hub here refers to the general hub ), one is direct access from a vswitch (the vswitch here is a relatively advanced vswitch, which is not included in the old-
BKJIA recommendation: Sniffer security technology from entry to entry
Learning the concept and principles of Sniffer is the foundation of Sniffer security technology. How should we get started with the knowledge of Sniffer security technology? Next let's introduce it to you one by one.
1. What is
parsing.The last three lines of code are specific applications where we use pcapy for data capture.pcap = pcapy.open_live(dev, 1500, 0, 100)Open_live method The first parameter is the device to be opened, the second parameter is the size of the capture packet, whether the third parameter turns on promiscuous mode, the fourth parameter is the delay time to wait for the packet, and the method returns a Pcapy object.pcap.setfilter(filter)Call the SetFilter method to set the filter.pcap.loop(0, han
, it can also provide valuable information for further attacks. It can be seen that the sniffer is actually a double-edged sword. Although the network sniffer technology is exploited by hackers to pose a certain threat to network security, the sniffer itself is not very harmful, mainly used to provide network intelligence for other hacker software, the real attac
explains a basic socket system call function, which is also a function used in the sniffer:
Socket ()
# Include # Include Int socket (int family, int type, int protocol );
The int family parameter specifies the communication protocol to be used. the following values are used:
AF_UNIX internal protocol
AF_INET I
analysis and utilization of this information helps to maintain network security. Weigh the pros and cons, it is necessary to introduce the implementation principle of network sniffer.
Design Principle of sniffer
As a network communication program, the sniffer program implements network communication through programming the network card. The programming of the ne
Sniffer is translated as a sniffer. It is a threatening passive attack tool! You can monitor the network status in an attack. Data Flow and information transmitted over the network can be attacked and intercepted through network monitoring. Hackers often like to use it to intercept user passwords!Sniffer can be divided into two types: one is hardware and the othe
are used:AF_UNIX internal protocolAF_INET Internet ProtocolAF_NS Xerox NS ProtocolAF_IMPLINK IMP connection LayerInt type specifies the socket type. The following values are used:SOCK_STREAM stream socketSOCK_DGRAM datagram socketSOCK_RAW unprocessed socketSOCK_SEQPACKET sequential PACKET socketThe int protocol parameter is usually set to 0.A socket () system call returns an integer called
Sniffer is translated as a sniffer. Is a threatening passive attack tool! You can monitor the network status in an attack. Data Flow and information transmitted over the network can be attacked and intercepted through network monitoring. Hackers often like to use it to intercept user passwords!
Sniffer can be divided into two types: one is hardware and the other
results to reduce the possibility of system corruption. For bsd unix, cpm can be used to detect the existence of sniffer.
Cpm is a tool software developed by CERT/CC. In 1994, many websites reported that legitimate user names, user passwords, and key data were maliciously stolen. cpm came into being at that time. For more information, see the following sites (http://www.cert.org/advisories/CA-1994-01.html ).
Cpm uses
Use Python to write network packet sniffer (Code a networks packet sniffer in Python for Linux) by Silver Moon Basic SnifferSniffers is programs that can capture/sniff/detect network traffic packet by packet and analyse them for various reasons. Commonly used in the field of network security. Wireshark is a very common packet Sniffer/protocol Analyzer. Packet sni
With the increasing popularity of Internet and e-commerce, the security of the Internet has been paid more and more attention. Sniffer and Forward play an important role in Internet security risks. This article will introduce Sniffer and how to block sniffer.
Most hackers only detect and take control of hosts on the Intranet. Only those "ambitious" hackers Instal
Author: Xia zhongyu1. Meanings of sniffer and snifferSniffers (sniffer) has nearly the same history as internet. sniffer is a common method for collecting useful data. The data can be user accounts and passwords, or commercial confidential data. With the increasing popularity of Internet and e-commerce, the security of the Internet has been paid more and more att
I don't know if I have ever sent it. I will forward it again.
Sniffer is a common method for collecting useful data. The data can be user accounts and passwords, or commercial confidential data. sniffer can be used as a device to capture network packets. ISS defines Sniffer as a tool to intercept data packets destined for other computers using computer network i
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.