Sniffing Spoofing Sesion Hijacking
Sniffing
Packet Sniffing Packet Sniffing What is packet snifng?
Ethreal
Now known as Wireshark
Wireshark
(2.1) Introduction to Ethereal
(2.2) Introduction to Ethereal
(2.3) Introduction to Ethereal
(5.1) Example: Analysis of packets exchanged between an LLRP Reader (IP: 206.169.229.171) and a Client
Wait … what is LLRP
Low Level Reader Protocol (LLRP)
RFID
RFID (bahasa Inggris: Radio Frequency Identification) atauQuestion ..
Masih inget dengan TCP/UDP ?
(5.2) Example: TCP Connection Establishment. Step 1. IP (18.58.0.254) requests a connection [SYN to IP
(5.3) Example: TCP Connection Establishment. Step 2. IP (206.169.229.171) accepts the connection [SYN, ACK
(5.4) Example: TCP Connection Establishment. Step 3. IP (18.58.0.254) acknowledges the last message [ACK so that
(5.5) Example: LLRP data transfer.
Question ...
Masih inget
(5.6) Example: LLRP data transfer.
Client sends to the Reader GET_READER_CAPABILITIES LLRP message
Session Hijacking adalah mengambil alih sebuah session pada satu Session Hijacking koneksi jaringan.
Spoofing
Type of Spoofing ARP Spoofing
IP Spoofing IP spoofing is the creation of TCP/IP packets with
Email Spoofing
Email Spoofing One simple form of email spoofing is to create a
Web Spoofing
MitM Attacks
‘Man-in-the-Middle’ refers to a machine that is set up so that traffic between
IP Spoofing Protect against with good firewall rules – keep your machines from Countermeasure Limit configuration access on machines launching a spoofed IP – router filters