As Linux becomes more and more widely used in the network, its security issues are getting more and more attention. This article mainly introduces the working principle and preventive measures of the sniffer technology.
What is a sniffer?
Sniffer is a device that can capture network packets.
Article Title: Design and Implementation of Sniffer in Linux environment. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
I. Sniffer
Among today's many hacking technologies, sniffer is the most common and important technology. Anyone who has used the sniffer tool on windows (for example, netxray and snifferpro) may know that in a shared Lan, using the sniffer tool can provide a clear view of all the traffic in the network! Among today's many hacking technologies,
for Pathfinder b
1. Using Arpspoof to implement ARP spoofing attacks on target machines# arpspoof-i Eth0-t 192.168.1.125 192.168.1.1
2. Using Dsniff to obtain data information for the specified port# dsniff-i Eth0-t 21/tcp=ftp,80/tcp=http
The types of protocols supported by Dsniff include:Ftp,telnet,smtp,http,pop,nntp,imap,snmp,ldap,rlogin,rip,ospF,pptp,ms-chap,nfs,vrrp,yp/nis,socks,x11,cvs,irc,aim,icq,napster,ostgresql,meeting Maker,citrix Ica,symantec, Pcanywhere,naI
I. Sniffer Principle Analysis Before implementing the sniffer, We need to master the TCP/IP protocol. TCP and IP protocols refer to two network protocols or data transmission methods used on the Internet ). They are transmission control protocol and Internet connection protocol. These two protocols are part of many TCP/IP protocol groups.The protocols in TCP/IP protocol groups ensure data transmission over
[O M personnel? Why? 06] Using sniffer to diagnose Linux network faults? Why? 05] system security inspection tool-nmaphttp: // www.2cto.com/ OS /201304/200744.htmlfu O M personnel are also known as sniffer in network security. [in O M? Why? 06] Using sniffer to diagnose Linux
[O M engineer _ 06] uses sniffer to diagnose Linux network faults[O M engineer _ 05] System Security Inspection tool-nmapHttp://www.bkjia.com/ OS /201304/200744.htmlO M personnel, good or false, such as sniffer)Sniffer is a double-edged sword in the field of network security. It can be used as a network attack tool
C Language Implementation Linux Network Sniffer 0x01 experiment IntroductionA network sniffer is a program that intercepts incoming and outgoing data through a network interface. So if you are browsing the Internet, the sniffer catches it in the form of a packet and displays it. In this experiment, we implemented a net
O M personnel, good or false, such as sniffer)
Sniffer is a double-edged sword in the field of network security. It can be used by hackers as a network attack tool or assists O M personnel in diagnosing network faults, this article takes three common network sniffer Tcpdump, Ethereal and EtherApe on Linux as an examp
-
Interface: 192.168.0.29 on interface 0x1000003
Internet address physical address type
192.168.0.1 00-50-56-40-07-71 dynamic
192.168.0.24 00-50-56-40-07-71 dynamic
The MAC addresses of the two IP addresses are exactly the same! But few will do this :-).
3. Set a packet forwarding rule
[Root @ Linux fragrouter-1.6] #./fragrouter-B1
Fragrouter: Base-1: normal IP Forwarding
Before that, do not forget to enable the packet forwarding function.
[Root @
Article Title: sniffer in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
In Linux, the sni
Hacker common sniffer Analysis in Linux environment-Linux Enterprise Application-Linux server application information. The following is a detailed description. This article analyzes in detail several sniffing devices that hackers often use in Linux, which are often planted o
Article Title: How to enable Sniffer network packets in Linux. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Sometimes it's really annoying to forget the FTP login account and pa
URL: ftp.gnu.org/gnu/bison/Download Bison The latest version of the package, the tar zxvf command to extract the files, into the Bison directory, with the command LS, you will find an executable file configure, and then execute./confugure(sudo) make(sudo) make install.This way, the Bison is compiled and installed.5. Compiling LibpcapThe above 4 steps are installed. Just go to www.tcpdump.org/to download the latest version of Libpcap. Then unzip the file and go to the directory. With the LS comm
: 0x00000000
Device boot start end blocks ID system/Dev/sdc1 1 970 124115 B w95 FAT32Partition 1 has different physical/logical beginnings (non-Linux ?) :Phys = (0, 2, 0) logical = (0, 2, 27)
From the last few lines, we can see that the U disk is mounted under/dev/sdc1. Remember this mount point, which varies according to the Linux system.
Step 2: mount the USB
Install a Linux system to a USB flash drive or a USB flash drive for a linux System
Step 1: First insert the usb flash drive to the usb interface of the Computer Host (it is recommended to insert the
urb_list; //URB for this endpoint, maintained by the USB core
void *hcpriv;
struct Ep_device *ep_dev; / * for SYSFS info * /
unsigned Char*extra; /* Extra descriptors * /
int Extralen;
int enabled;
};
an int usb_hcd_link_urb_to_ep (struct USB_HCD *hcd, struct URB *urb) is called to add this urb to urb_ when invoking the USB device driver call Usb_submit_urb commit URB Request List on th
From the Protocol to the Protocol (above)
In structusb_driver, the prototype of. Probe and. Disconnect is as follows:
836 int (* probe) (struct usb_interface * INTF,
837 const struct usb_device_id * ID );
838
839 void (* disconnect) (struct usb_interface * INTF );
Let's take a look at the parameter structusb_device_id, Which is needless to say. As we have already introduced, where does struct usb_interface come from? Let's start with struct usb_device.
We know that each device corresponds to a s
interface descriptor.
Row 3, struct us_unusual_dev, is the first occurrence of this struct, which is defined in drivers/USB/storage/USB. h:
61 struct us_unusual_dev {
62 constchar * vendorname;
63 const char * productname;
64 _ u8 useprotocol;
65 _ u8 usetransport;
66 int (* initfunction) (struct us_data *);
67 };
The find_unusual () function on the right of "=" is defined in drivers/
use another pointer to temporarily replace altsetting. Next we will use its members desc and endpoint.
Looking back at structusb_host_interface, we can see its two members: struct usb_interface_descriptor desc and struct usb_host_endpoint * endpoint. Among them, desc is needless to say, it is the interface descriptor of this interface, and the endpoint pointer records several endpoints, they are stored in the form of an array, and the endpoint points to the array header. These are all set duri
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.