0
23kviews
Compare packet sniffing and packet spoofing. Explain session hijacking attack.
1 Answer
| written 9.0 years ago by |
| Packet sniffing(snooping) | Packet spoofing |
|---|---|
| Packet sniffing refers to listening to other’s conversation. | Packet spoofing refers to actively introducing fake network traffic pretending to be someone else. |
| It is a passive attack (i.e. attacker cannot cause any kind of damage) | It is an active attack (i.e. attacker can insert malicious program to infect the other system) |
| Packet sniffing is usually done by gaining access to a computer/device through which the traffic flows (e.g. router or admin-PC) | Packet spoofing is done by sending packets with incorrect source address. The receiver the sends reply to this forged(spoofed) address. (Modifying routing tables) |
| Encryption is the best method to tackle sniffing | Digital signatures is a good method to tackle spoofing |
| TCP/IP Hijack | RST hijacking | Blind hijack |
|---|---|---|
| Uses spoofed packets to take control of victim’s system.To launch a TCP/IP attack, the hacker must be in same network.The victim & target machine can be anywhere | RST hijacking involves injecting an authentic-looking reset (RST) packet.The victim will believe that source actually sent the resent packet and reset’s connection. | Hacker sends malicious codes and commands but has got no access to see the response of his actions. |