{"id":92,"date":"2016-09-07T15:10:52","date_gmt":"2016-09-07T15:10:52","guid":{"rendered":"http:\/\/capella.acm.org\/wp\/?p=92"},"modified":"2016-09-07T15:14:59","modified_gmt":"2016-09-07T15:14:59","slug":"packet-sniffers-why-do-we-use-them","status":"publish","type":"post","link":"http:\/\/capella.acm.org\/wp\/?p=92","title":{"rendered":"Packet Sniffers &#8211; Why Do We Use Them?"},"content":{"rendered":"<p><a href=\"http:\/\/capella.acm.org\/wp\/wp-content\/uploads\/2016\/09\/lockandkey.jpg\" rel=\"attachment wp-att-96\"><img loading=\"lazy\" class=\"alignright wp-image-96\" title=\"www.pixabay.com\" src=\"http:\/\/capella.acm.org\/wp\/wp-content\/uploads\/2016\/09\/lockandkey-300x225.jpg\" alt=\"Attribution: www.pixabay.com\" width=\"195\" height=\"146\" srcset=\"http:\/\/capella.acm.org\/wp\/wp-content\/uploads\/2016\/09\/lockandkey-300x225.jpg 300w, http:\/\/capella.acm.org\/wp\/wp-content\/uploads\/2016\/09\/lockandkey.jpg 640w\" sizes=\"(max-width: 195px) 100vw, 195px\" \/><\/a><\/p>\n<p>Packet sniffers are also called packet analyzers. Hackers use packet sniffers, but so do IT security professionals in various corporations.\u00a0 Sniffing involves capturing, decoding, inspecting and interpreting information inside of a network packet, (I am sure we all can agree with that).\u00a0 The hacker\u2019s purpose here is to steal information. Usually it is the user IDs, passwords, network details, credit card information, etc.\u00a0 Sniffing generally is a passive type of attack, where the attacker can be silent on the network.\u00a0 It makes it difficult to detect, and hence it is very dangerous.\u00a0 The sniffing process is used by hackers to either get information directly or map the technical details of that company\u2019s network he or she is trying to create further attacks on.\u00a0 What they are doing at this point is just gathering information. You can use a packet sniffer available from <a href=\"https:\/\/www.wireshark.org\" target=\"_blank\"> Wireshark <\/a>(a widely-used, free open-source tool) to look at packets to see what information is trying to be captured, or you can use it for routing network issues.\u00a0 As you can see, there is a good and bad side of packet sniffing.\u00a0 I have used Wireshark a few times at home, just to mess with my wife and pick on her on what she is viewing when she is on her phone, and yes, it can grab wireless traffic as well.\u00a0 I was sitting in the kitchen one day at the bar top and I would look over at her as she is on her phone. I ask, \u201cWhat are you buying now on QVC?\u201d\u00a0 She would ask, \u201cHow do you know being over there in the kitchen that I am buying something on QVC?\u201d\u00a0 As you can see, it comes in handy sometimes.\u00a0 Come back we will discuss ethical and unethical usage of a packet sniffer.<\/p>\n<p>William Maree,<br \/>\nCapella ACM Student Chapter Vice Chair<br \/>\nBlog Contributor<br \/>\nWeb Development Team Member<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Packet sniffers are also called packet analyzers. Hackers use packet sniffers, but so do IT security professionals in various corporations.\u00a0 Sniffing involves capturing, decoding, inspecting and interpreting information inside of a network packet, (I am sure we all can agree with that).\u00a0 The hacker\u2019s purpose here is to steal information. Usually it is the user [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/capella.acm.org\/wp\/index.php?rest_route=\/wp\/v2\/posts\/92"}],"collection":[{"href":"http:\/\/capella.acm.org\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/capella.acm.org\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/capella.acm.org\/wp\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/capella.acm.org\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=92"}],"version-history":[{"count":10,"href":"http:\/\/capella.acm.org\/wp\/index.php?rest_route=\/wp\/v2\/posts\/92\/revisions"}],"predecessor-version":[{"id":103,"href":"http:\/\/capella.acm.org\/wp\/index.php?rest_route=\/wp\/v2\/posts\/92\/revisions\/103"}],"wp:attachment":[{"href":"http:\/\/capella.acm.org\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=92"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/capella.acm.org\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=92"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/capella.acm.org\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=92"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}