WITH WIRESHARK
MADE BY JOHN ATKINSON
1
, SUMMARY
NETWORK TRAFFIC SNIFFING AND TOOLS
WIRESHARK
DIFFERENCES BETWEEN MAN IN THE MIDDLE ATTACK AND NETWORK SNIFFING
SCENARIO OF THE ATTACK
HTTP PROTOCOL
LEGAL REQUIREMENTS
HOW TO…ATTACK
LAB SESSION
HTTPS AND SSL
LAB SESSION
Q&A
2
, Tools and techniques to sniff the network traffic and packets over the network are either used for admin
or malicious purposes. Packet sniffers are program used to read packets that travel across the network la
© S.Ansari, Packet Sniffing, Mysore, India, IEE, 2003
Network administrators use them to analyse and monitor the network traffic, to solve problems on their
network, while attackers use them to cause damage.
3