Solved

HTTP POST packets in broadcast

Posted on 2016-11-01
5
59 Views
Last Modified: 2016-11-02
Experts,

Do HTTP POST packets appear in a broadcast?

Suppose client-1 10.10.10.50/24 tries to authenticate to server 10.10.20.50/24 via HTTP.  
client-2 on 10.10.20.51/24 is sniffing the wire. Will the hTTP POST be broadcasted to client-2?
0
Comment
Question by:trojan81
  • 2
  • 2
5 Comments
 
LVL 8

Assisted Solution

by:James Bilous
James Bilous earned 250 total points
ID: 41868585
Yes, someone sniffing the wire could see the post packets being sent, which is why encryption is always recommended for authentication.
0
 
LVL 25

Accepted Solution

by:
Dr. Klahn earned 250 total points
ID: 41868593
HTTP packets are unicast to a specific address, not broadcast.

The interface on client 2 that is (presumably) in promiscuous mode sniffing the network will see the packet because it is in promiscuous mode.
0
 

Author Comment

by:trojan81
ID: 41868608
DR Khan, since the http packet is unicast to the server and not broadcast, explain how client-2 will always see the packet even in promiscuous mode
0
 
LVL 25

Expert Comment

by:Dr. Klahn
ID: 41868617
A network interface that is in promiscuous mode sees all traffic on its network.  This is how traffic sniffers work -- promiscuous mode works on any interface on any system.  There is no special hardware involved.
0
 
LVL 8

Expert Comment

by:James Bilous
ID: 41868624
I believe that this is more true for wireless than it is for ethernet. With the right MAC Address tables set up on intermediary routers between the source and destination machines, a node with a NIC in promiscuous mode does not necessarily see the traffic passed between the two. On wireless, all unicast packets can be seen by the NICS in transmission range.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Foreword In the years since this article was written, numerous hacking attacks have targeted password-protected web sites.  The storage of client passwords has become a subject of much discussion, some of it useful and some of it misguided.  Of cou…
Both Easy and Powerful How easy is PHP? http://lmgtfy.com?q=how+easy+is+php  Very easy.  It has been described as "a programming language even my grandmother can use." How powerful is PHP?  http://en.wikipedia.org/wiki/PHP  Very powerful.  But a…
In a recent question (https://www.experts-exchange.com/questions/28997919/Pagination-in-Adobe-Acrobat.html) here at Experts Exchange, a member asked how to add page numbers to a PDF file using Adobe Acrobat XI Pro. This short video Micro Tutorial sh…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question