 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
• |
Goal is
generally to obtain information
|
|
|
Account
usernames, passwords
|
|
|
|
Source code,
business critical information
|
|
|
• |
Usually a
program placing an Ethernet
|
|
adapter into
promiscuous mode and
|
|
|
saving
information for retrieval later
|
|
|
• |
Hosts running
the sniffer program is
|
|
|
compromised
using host attack
|
|
|
methods
|
|