|
||
|
||
|
||
|
||
|
||
|
||
List of Protocol analyzers for free download, what is sniffer , how sniffer works
|
||
Protocol Analyzers Free Download |
||
|
||
Trial Version Download SOFT PERFECT (3.22MB)
|
||
|
||
100% Free Download WIRESHARK (17.4MB)
|
||
What is Protocol Analyzer?
|
||
How the hackers are able to use sniffers? The purpose of a sniffer is to monitor the network traffic. But the hackers may install a sniffer with the help of a worm on compromised computers. (Note: Worm is auto-probagataing. The payload of this worm will be a trojan which will install the sniffer). Once the sniffer is installed, it can capture the login and banking and credit card information of the other computers on the same LAN network. The sniffer will transmit the filtered data back to the hacker. How to protect my LAN network from this malicious sniffers? You can use sniffer detecting softwares. You can check whether the network cards are configured for "promiscuous mode" . What is PROMISCUOUS MODE"? Normally, the network cards do not bother about the packets which are not addressed to them. But, if the card is set for 'promicuous mode' , then the card will capture not only the traffic addressed to it but also the all the traffic passing on the wire. So Promiscuous mode means Sniffing Mode.
|
||
|
||
|
||
|
||
|
||
List of Protocol analyzers for free download, what is sniffer , how sniffer works