Questions about this topic? Sign up to ask in the talk tab.
Difference between revisions of "Networking Concepts"
From NetSec
GertieUbpgdd (Talk | contribs) |
|||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
+ | {{expand}} | ||
[[Sniffing]] - Intercepting and reading traffic | [[Sniffing]] - Intercepting and reading traffic | ||
Line 5: | Line 6: | ||
Packets - Small snippets of data that establish or carry data for connections or stateless [[protocols]] | Packets - Small snippets of data that establish or carry data for connections or stateless [[protocols]] | ||
− | Packet Injection - Forging packets | + | [[TCP-RST_Injection|Packet Injection]] - Forging packets |
Line 17: | Line 18: | ||
*wireshark | *wireshark | ||
*ettercap | *ettercap | ||
− | |||
− |
Latest revision as of 22:18, 19 May 2012
This article contains too little information, it should be expanded or updated. |
---|
Things you can do to help:
|
MitM attack - (Man in the Middle attack) A way to get between two hosts so that traffic can be sniffed between them
Packets - Small snippets of data that establish or carry data for connections or stateless protocols
Packet Injection - Forging packets
Tools:
- Cain & Abel
- nemesis
- tcpdump
- iptables
- snort
- wireshark
- ettercap