•Goal is generally to obtain
information
Account usernames, passwords
Source code, business critical
information
•Usually a program placing an Ethernet adapter into
promiscuous mode and saving information for retrieval later
•Hosts running the sniffer program is compromised using
host attack methods