0
22kviews
Compare packet sniffing and packet spoofing. Explain session hijacking attack.
1 Answer
written 8.0 years ago by |
Packet sniffing(snooping) | Packet spoofing |
---|---|
Packet sniffing refers to listening to other’s conversation. | Packet spoofing refers to actively introducing fake network traffic pretending to be someone else. |
It is a passive attack (i.e. attacker cannot cause any kind of damage) | It is an active attack (i.e. attacker can insert malicious program to infect the other system) |
Packet sniffing is usually done by gaining access to a computer/device through which the traffic flows (e.g. router or admin-PC) | Packet spoofing is done by sending packets with incorrect source address. The receiver the sends reply to this forged(spoofed) address. (Modifying routing tables) |
Encryption is the best method to tackle sniffing | Digital signatures is a good method to tackle spoofing |
TCP/IP Hijack | RST hijacking | Blind hijack |
---|---|---|
Uses spoofed packets to take control of victim’s system.To launch a TCP/IP attack, the hacker must be in same network.The victim & target machine can be anywhere | RST hijacking involves injecting an authentic-looking reset (RST) packet.The victim will believe that source actually sent the resent packet and reset’s connection. | Hacker sends malicious codes and commands but has got no access to see the response of his actions. |