Solved

Hacking networking packet

Posted on 2013-05-13
4
437 Views
Last Modified: 2013-05-23
I have a question on hacking.  Is is possible for someone to use a network analyser (e.g. wireshack) to capture network packets and then massage it or change the content and resend it as the originator.  Is possible how can I eliminate such threat.  My client/server is running on a public network that can be monitored by outsider.
0
Comment
Question by:tommym121
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 21

Assisted Solution

by:Rick_O_Shay
Rick_O_Shay earned 150 total points
ID: 39161206
Yes that is possible and it is called a "man in the middle" attack.
The best way to defend against it is to use some form of authentication/encryption like https vs http.
0
 
LVL 25

Assisted Solution

by:Cyclops3590
Cyclops3590 earned 200 total points
ID: 39161223
this is often handled in one of two areas but with the same mechanism: authentication.  usually its some type of hashing or digital signatures that are used depending on if pre-shared keys or certificates are used.  digital signatures is better though.  authentication maintains the integrity of the data but doesn't keep the data hidden; that is encryption.

it can either be handled by the application itself or a lower layer protocol like IPSec.  I would use IPSec as it should be more transparent to your application functionality and thus no code changes required.

however there are two main issues you need to worry about.  the first you identified, which is that a hacker could perform a man-in-the-middle attack and change the data.  the other is a replay attack in which the attacker doesn't care about the contents (say the password), they just know what data exists (whether encrypted or not).  so they "replay" or resend the captured data to gain unauthorized access.  IPSec can also help alleviate that risk with the ESP function.  IPSec is typically used for VPN only though. What kind of site are you running?  Using SSL may be useful to look at as well.  SSL is just a way to use certificates to identify who you are talking with and then create keys to do encryption, it doesn't have to just be used with HTTP.  It should take care of most of your concerns as well.

hope this explains the risks a little better.  also, keep in mind there is no way to "eliminate" risks, only mitigate, or make the probability of successful attack less.
0
 
LVL 10

Accepted Solution

by:
ienaxxx earned 150 total points
ID: 39161245
Use switches that monitors and avoid ARP poisoning and use cryptography for all client/server connections. (you can enable it on your servers infrastructure, same if it's windows or linux).
0
 

Author Closing Comment

by:tommym121
ID: 39190849
Thanks
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question