Sniffing Spoofing Sesion Hijacking

  Sniffing

  Packet Sniffing Packet Sniffing What is packet snifng?

  

Ethreal

  Now known as Wireshark

  Wireshark

  (2.1) Introduction to Ethereal

  (2.2) Introduction to Ethereal

  (2.3) Introduction to Ethereal

  (5.1) Example: Analysis of packets exchanged between an LLRP Reader (IP: 206.169.229.171) and a Client

  Wait … what is LLRP

  Low Level Reader Protocol (LLRP)

  

RFID

RFID (bahasa Inggris: Radio Frequency Identification) atau

  Question ..

  

  Masih inget dengan TCP/UDP ?

  (5.2) Example: TCP Connection Establishment. Step 1. IP (18.58.0.254) requests a connection [SYN to IP

  (5.3) Example: TCP Connection Establishment. Step 2. IP (206.169.229.171) accepts the connection [SYN, ACK

  (5.4) Example: TCP Connection Establishment. Step 3. IP (18.58.0.254) acknowledges the last message [ACK so that

  (5.5) Example: LLRP data transfer.

  Question ...

  

  Masih inget

  (5.6) Example: LLRP data transfer.

Client sends to the Reader GET_READER_CAPABILITIES LLRP message

   Session Hijacking adalah mengambil alih sebuah session pada satu Session Hijacking koneksi jaringan.

  Spoofing

  Type of Spoofing ARP Spoofing

  IP SpoofingIP spoofing is the creation of TCP/IP packets with

  Email Spoofing

   Email Spoofing One simple form of email spoofing is to create a

  

Web Spoofing

   MitM Attacks

‘Man-in-the-Middle’ refers to a machine that is set up so that traffic between

   IP Spoofing Protect against with good firewall rules – keep your machines from Countermeasure Limit configuration access on machines launching a spoofed IP – router filters