
- •Acknowledgments
- •About the Author
- •Contents at a Glance
- •Contents
- •Table of Exercises
- •Introduction
- •Assessment Test
- •Answers to Assessment Test
- •Defining Ethical Hacking
- •How to Be Ethical
- •Keeping It Legal
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Reconnaissance
- •Information-Gathering Methodology
- •Social Engineering
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Scanning
- •Enumeration
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •The Simplest Way to Get a Password
- •Types of Passwords
- •Cracking a Password
- •Understanding Keyloggers and Other Spyware Technologies
- •Escalating Privileges
- •Understanding Rootkits
- •Hiding Files
- •Understanding Steganography Technologies
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Trojans and Backdoors
- •Viruses and Worms
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •How a Sniffer Works
- •Sniffing Countermeasures
- •Bypassing the Limitations of Switches
- •Wireshark Filters
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Denial of Service
- •Session Hijacking
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •How Web Servers Work
- •Types of Web Server Vulnerabilities
- •Web Application Vulnerabilities
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •SQL Injection
- •Buffer Overflows
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Wi-Fi and Ethernet
- •Authentication and Cracking Techniques
- •Using Wireless Sniffers to Locate SSIDs
- •MAC Filters and MAC Spoofing
- •Rogue Access Points
- •Wireless Hacking Techniques
- •Securing Wireless Networks
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Components of Physical Security
- •Understanding Physical Security
- •Physical Site Security Countermeasures
- •What to Do After a Security Breach Occurs
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Linux Basics
- •Compiling a Linux Kernel
- •GCC Compilation Commands
- •Installing Linux Kernel Modules
- •Linux Hardening Methods
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Types of IDSs and Evasion Techniques
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Generating Public and Private Keys
- •Cryptography Algorithms
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Defining Security Assessments
- •Penetration Testing
- •Pen Test Deliverables
- •Summary
- •Exam Essentials
- •Review Questions
- •Answers to Review Questions
- •Glossary
- •Index

166 Chapter 6 n Gathering Data from Networks: Sniffers
Cain & Abel is a multipurpose hacking tool for Windows. It allows easy recovery of various kinds of passwords by sniffing the network; cracking encrypted passwords using dictionary or brute-force attacks; recording Voice over IP, or VoIP, conversations; decoding scrambled passwords; revealing password boxes; uncovering cached passwords; and analyzing routing protocols. The latest version contains a lot of new features like ARP Poison Routing (APR), which enables sniffing on switched LANs and man-in-the-middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and it contains filters to capture credentials from a wide range of authentication mechanisms.
Packet Crafter is a tool used to create custom TCP/IP/UDP packets. The tool can change the source address of a packet to do IP spoofing and can control IP flags (such as checksums) and TCP flags (such as the state flags, sequence numbers, and ack numbers).
SMAC is a tool used to change the MAC address of a system. It lets a hacker spoof a MAC address when performing an attack.
MAC Changer is a tool used to spoof a MAC address on Unix. It can be used to set the network interface to a specific MAC address, set the MAC randomly, set a MAC of another vendor, set another MAC of the same vendor, set a MAC of the same kind, or display a vendor MAC list to choose from.
WinDNSSpoof is a simple DNS ID spoofing tool for Windows. To use it on a switched network, you must be able to sniff traffic of the computer being attacked. Therefore, it may need to be used in conjunction with an ARP spoofing or flooding tool.
Distributed DNS Flooder sends a large number of queries to create a DoS attack, disabling DNS. If DNS daemon software logs incorrect queries, the impact of this attack is amplified.
Summary
Sniffing is an invaluable tool in the CEH’s toolkit. Sniffing can be used to gather information passively and capture valuable data such as passwords. The advantage of sniffing is that it can be performed passively and is virtually undetectable when used in a passive mode. More aggressive methods of sniffing, such as ARP poisoning and DNS spoofing, can be used if passive sniffing does not yield the information the CEH is looking to gather. Just be forewarned that these active methods can be detected and alert security personnel to an attack on the network.

Exam Essentials |
167 |
Exam Essentials
Understand how a sniffer works. A sniffer operates in promiscuous mode, meaning it captures all traffic regardless of the destination MAC specified in the frame.
Understand the differences between sniffing in a shared network connected via hubs and a switched network. All traffic is broadcast by a hub, but it’s segmented by a switch. To sniff on a switched network, either flooding or ARP spoofing tools must be used.
Know the difference between packets and frames. Packets are created at Layer 3 of the OSI model, and frames are created at Layer 2.
Understand how the Address Resolution Protocol (ARP) works. ARP is used to find a MAC address from a known IP address by broadcasting the request on the network.
Know the difference between active and passive sniffing. Active sniffing is used to trick the switch into acting like a hub so that it forwards traffic to the attacker. Passive sniffing captures packets that are already being broadcast on a shared network.

168 Chapter 6 n Gathering Data from Networks: Sniffers
Review Questions
1.What is sniffing?
A.Sending corrupted data on the network to trick a system
B.Capturing and deciphering traffic on a network
C.Corrupting the ARP cache on a target system
D.Performing a password-cracking attack
2.What is a countermeasure to passive sniffing?
A.Implementing a switched network
B.Implementing a shared network
C.ARP spoofing
D.Port-based security
3.What type of device connects systems on a shared network?
A.Routers
B.Gateways
C.Hubs
D.Switches
4.Which of the following is a countermeasure to ARP spoofing?
A.Port-based security
B.WinTCPkill
C.Wireshark
D.MAC-based security
5.What is dsniff?
A.A MAC spoofing tool
B.An IP address spoofing tool
C.A collection of hacking tools
D.A sniffer
6.At what layer of the OSI model is data formatted into packets?
A.Layer 1
B.Layer 2
C.Layer 3
D.Layer 4

Review Questions |
169 |
7.What is snort?
A.An IDS and packet sniffer
B.Only an IDS
C.Only a packet sniffer
D.Only a frame sniffer
8.What mode must a network card operate in to perform sniffing?
A.Shared
B.Unencrypted
C.Open
D.Promiscuous
9. The best defense against any type of sniffing is |
. |
A.Encryption
B.A switched network
C.Port-based security
D.A good security training program
10.For what type of traffic can WinSniffer capture passwords? (Choose all that apply.)
A.POP3
B.SMTP
C.HTTP
D.HTTPS
11.Which of the following software tools can perform sniffing? (Choose all that apply.)
A.Dsniff
B.Wireshark
C.NetBSD
D.Netcraft
12.At what layer of the OSI model is data formatted into frames?
A.Layer 1
B.Layer 2
C.Layer 3
D.Layer 4
13.In which type of header are MAC addresses located?
A.Layer 1
B.Layer 2
C.Layer 3
D.Layer 7

170 Chapter 6 n Gathering Data from Networks: Sniffers
14.In which type of header are IP addresses located?
A.Layer 1
B.Layer 2
C.Layer 3
D.Layer 7
15.In which header do port numbers appear?
A.IP
B.MAC
C.Data Link
D.Transport
16.What is the proper Wireshark filter to capture traffic only sent from IP address 131.1.4.7?
A.ip.src == 131.1.4.7
B.ip.address.src == 131.1.4.7
C.ip.source.address == 131.1.4.7
D.src.ip == 131.1.4.7
17.Which Wireshark filter will only capture traffic to www.google.com?
A.ip.dst = www.google.com
B.ip.dst eq www.google.com
C.ip.dst == www.google.com
D.http.dst == www.google.com
18.Passwords are found in which layer of the OSI model?
A.Application
B.IP
C.Data Link
D.Physical
19. Wireshark was previously known as |
. |
A.Packet Sniffer
B.Ethereal
C.EtherPeek
D.SniffIT
20.Cain & Abel can perform which of the following functions? (Choose all that apply.)
A.Sniffing
B.Packet generation
C.Password cracking
D.ARP poisoning