It commonly used in man-in-the-middle (MITM) attacks and denial-of-service (DoS) attacks. The packet injection allows a malicious user to intercept the packets from the communicating parties, which can lead to degradation or blockage of legit users’ ability to utilize the network services. Packet injection is the process of interfering with a network connection which is already established by constructing the packets that appears to be a part of the normal communication stream. This mode usually requires some packet analysis software such as Wireshark or Capsa to analyze the captured frames. This mode is normally used for packet sniffing and requires you to connect to the network before you can start sniffing. The Promiscuous mode is applicable on both wired and wireless networks. Promiscuous mode allows a wired or wireless network interface controller (NIC) to listen for all the frames that are sent or received on a network. The Monitor mode is only applicable on wireless NICs and it also known as RFMON (Radio Frequency MONitor) mode. Monitor mode allows a computer’s wireless network adapter to monitor all traffic received on a wireless channel without having to associate with the access point first.
0 Comments
Leave a Reply. |