Solved

Listening In On Other Website Request/Responses

Posted on 1998-10-09
1
178 Views
Last Modified: 2010-03-18
I remember reading about people around the net can listen in on conversations being made by another user to another user (ie. a person is downloading a webpage or sending a request for a webpage, and there can be another person is in the corner watching these transactions).

How is this possible?  I have heard of a program called: LISTEN  but I don't know if it allows one to actually sit and listen in on the incoming calls/responses from another website.  How is this possible to acheive?

Thanks.
0
Comment
Question by:ratboy2
1 Comment
 
LVL 1

Accepted Solution

by:
pestilence earned 50 total points
ID: 1587128
This kind of question you ask it very technical...
Hmmm from i didn't understand well what you asked but i'll give it a shot to answer.
The most common way to "listen" to some short of network connection is a sniffer.
Sniffer is a small program that is installed on one side of a network connection (e.g system A) and logs all incoming traffic...
The logs though are not that simple as common logs...what it actually does is "dump" the packet...this requires that you have a good knowledge of TCP/IP and network layering.
To make this thing work you need to be running the program on one side of the connection this means that if there are 2 hosts e.g A & B, the program should be running either on 1 of the 2 hosts.
there are off course ways to make a sniffing from a third system, but this also requires even more good knowledge...
For the moment just take a look at the basics of sniffers, you can find a FAQ about them at:
http://www.aggressor.net/pestilence in the library area.
P.S sniffers mainly usage is for determining Network problems from by whom they are generated.

0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now