Solved

Listening In On Other Website Request/Responses

Posted on 1998-10-09
1
181 Views
Last Modified: 2010-03-18
I remember reading about people around the net can listen in on conversations being made by another user to another user (ie. a person is downloading a webpage or sending a request for a webpage, and there can be another person is in the corner watching these transactions).

How is this possible?  I have heard of a program called: LISTEN  but I don't know if it allows one to actually sit and listen in on the incoming calls/responses from another website.  How is this possible to acheive?

Thanks.
0
Comment
Question by:ratboy2
1 Comment
 
LVL 1

Accepted Solution

by:
pestilence earned 50 total points
ID: 1587128
This kind of question you ask it very technical...
Hmmm from i didn't understand well what you asked but i'll give it a shot to answer.
The most common way to "listen" to some short of network connection is a sniffer.
Sniffer is a small program that is installed on one side of a network connection (e.g system A) and logs all incoming traffic...
The logs though are not that simple as common logs...what it actually does is "dump" the packet...this requires that you have a good knowledge of TCP/IP and network layering.
To make this thing work you need to be running the program on one side of the connection this means that if there are 2 hosts e.g A & B, the program should be running either on 1 of the 2 hosts.
there are off course ways to make a sniffing from a third system, but this also requires even more good knowledge...
For the moment just take a look at the basics of sniffers, you can find a FAQ about them at:
http://www.aggressor.net/pestilence in the library area.
P.S sniffers mainly usage is for determining Network problems from by whom they are generated.

0

Featured Post

Master Your Team's Linux and Cloud Stack

Come see why top tech companies like Mailchimp and Media Temple use Linux Academy to build their employee training programs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
how does facebook / twitter store data? 3 130
FTP File Transfer Failure 13 156
Proxy with authentication for internet access 5 118
Set linux box as ip router 3 23
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question