Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Networking Concepts"
From NetSec
GertieUbpgdd (Talk | contribs) |
|||
| (2 intermediate revisions by 2 users not shown) | |||
| Line 1: | Line 1: | ||
| + | {{expand}} | ||
[[Sniffing]] - Intercepting and reading traffic | [[Sniffing]] - Intercepting and reading traffic | ||
| Line 5: | Line 6: | ||
Packets - Small snippets of data that establish or carry data for connections or stateless [[protocols]] | Packets - Small snippets of data that establish or carry data for connections or stateless [[protocols]] | ||
| − | Packet Injection - Forging packets | + | [[TCP-RST_Injection|Packet Injection]] - Forging packets |
| Line 17: | Line 18: | ||
*wireshark | *wireshark | ||
*ettercap | *ettercap | ||
| − | |||
| − | |||
Latest revision as of 22:18, 19 May 2012
| This article contains too little information, it should be expanded or updated. |
|---|
Things you can do to help:
|
MitM attack - (Man in the Middle attack) A way to get between two hosts so that traffic can be sniffed between them
Packets - Small snippets of data that establish or carry data for connections or stateless protocols
Packet Injection - Forging packets
Tools:
- Cain & Abel
- nemesis
- tcpdump
- iptables
- snort
- wireshark
- ettercap