Improve company productivity with a Business Account.Sign Up

x
?
Solved

Hacking networking packet

Posted on 2013-05-13
4
Medium Priority
?
445 Views
Last Modified: 2013-05-23
I have a question on hacking.  Is is possible for someone to use a network analyser (e.g. wireshack) to capture network packets and then massage it or change the content and resend it as the originator.  Is possible how can I eliminate such threat.  My client/server is running on a public network that can be monitored by outsider.
0
Comment
Question by:tommym121
4 Comments
 
LVL 21

Assisted Solution

by:Rick_O_Shay
Rick_O_Shay earned 600 total points
ID: 39161206
Yes that is possible and it is called a "man in the middle" attack.
The best way to defend against it is to use some form of authentication/encryption like https vs http.
0
 
LVL 25

Assisted Solution

by:Cyclops3590
Cyclops3590 earned 800 total points
ID: 39161223
this is often handled in one of two areas but with the same mechanism: authentication.  usually its some type of hashing or digital signatures that are used depending on if pre-shared keys or certificates are used.  digital signatures is better though.  authentication maintains the integrity of the data but doesn't keep the data hidden; that is encryption.

it can either be handled by the application itself or a lower layer protocol like IPSec.  I would use IPSec as it should be more transparent to your application functionality and thus no code changes required.

however there are two main issues you need to worry about.  the first you identified, which is that a hacker could perform a man-in-the-middle attack and change the data.  the other is a replay attack in which the attacker doesn't care about the contents (say the password), they just know what data exists (whether encrypted or not).  so they "replay" or resend the captured data to gain unauthorized access.  IPSec can also help alleviate that risk with the ESP function.  IPSec is typically used for VPN only though. What kind of site are you running?  Using SSL may be useful to look at as well.  SSL is just a way to use certificates to identify who you are talking with and then create keys to do encryption, it doesn't have to just be used with HTTP.  It should take care of most of your concerns as well.

hope this explains the risks a little better.  also, keep in mind there is no way to "eliminate" risks, only mitigate, or make the probability of successful attack less.
0
 
LVL 10

Accepted Solution

by:
ienaxxx earned 600 total points
ID: 39161245
Use switches that monitors and avoid ARP poisoning and use cryptography for all client/server connections. (you can enable it on your servers infrastructure, same if it's windows or linux).
0
 

Author Closing Comment

by:tommym121
ID: 39190849
Thanks
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
2017 was a scary year for cyber security.  Hear what our security experts say that hackers have in store for us in 2018.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

585 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question