Saturday 16 February 2013

WiFi Sniffers



Although many people like to rely on their laptop computer to detect available wireless networks at a particular location, devices known as WiFi sniffers were created specifically to capture this information. The basic premise being that before someone goes to the trouble of starting up their computer, they can verify that there is indeed a compatible and available wireless broadband network in the area.

WiFi sniffers are available both as stand-alone, hard-top items and as software add-on applications for a person's portable wireless devices. Many of these add-on applications for smartphones and PDAs are free of charge; as the penetration of portable wireless devices has increased, it has rendered hard-top WiFi sniffers obsolete for all but the most specialized of IT personnel.

Some companies have banned WiFi sniffer software and applications that have the capability to randomly scan for available networks. These plug-ins, also known as stumblers, were removed in favor of authorized directory-based applications. Both free and fee-based directory applications and plug-ins are commonly available.

In today's ultra-competitive, user-review driven Internet environment, much online discussion is now focused on which of these add-on WiFi sniffers are the best at doing the sniffing. WiFi sniffer reviews are readily available on online tech websites and social media platforms; users are quick to share their opinion about an add-on's effectiveness as soon as they have tried it.

What Is Network Sniffing?



Network sniffing is a method of using specialized hardware and software to access information that isn’t being sent to someone or analyzing networks to which individuals don’t have legitimate access. Most sniffers work by analyzing data packets. Depending on which type of network sniffing is being used, the sniffer can read these packets both inside and outside a network. While network sniffing does have several legitimate uses, it is generally associated with the hacking community.

After information is sent over a network, it is broken up into packets. These packets contain a small amount of the information, the addresses of the receiver and sender and some technical data. Specialized hardware or software can intercept and copy these packets. Once she has a copy, a user is able to open the packet and read the information and addresses.

When done from inside a network, this is usually an internal security and troubleshooting method. System administrators will randomly monitor packets to make sure that the intended addressee is not attempting to circumvent Internet security protocols or access blocked locations. With this form of network sniffing, typically only the addresses are read.

If used as an internal network troubleshooting method, packets are analyzed in streams, often from across an entire network switch. Packets are checked for degradation in data or missing sequences. If there are any problems, then the network likely has a faulty piece of hardware. Additional locations are tested using similar methods until the faulty piece is found.

What Is WiFi Sniffing?



WiFi is the standard for Wireless Local Area Networks (WLAN), while sniffing can be a synonym for snooping. When the terms are combined, WiFi sniffing often refers to uncovering either the location of a wifi® network or the activity on a WiFi network; this can be either for innocent or even laudatory purposes. It can also be done in an attempt to gain internet access illegally, or at least, unethically, and possibly with the intent to cause damage.

Also spelled Wi-Fi, the wireless standard is based on a document known as IEEE 802.11, which was written and is maintained by the Institute of Electrical and Electronics Engineers (IEEE). The name WiFi® is said to come either from abbreviations of the words Wireless and Fidelity or the words Wire, in reference to the traditional physical connection in LANs, and an alteration and shortening of Physical, referring to the Physical Layer of the Open System Interconnection (OSI)Reference Model.

What Is Port Sniffing?



WiFi sniffing to locate viable networks can be legitimately used for activities like searching an unfamiliar urban area for a wireless hotspot. This can be done with an electronic device or with software; the same device can be used to detect and steal WiFi from a homeowner who has it activated in their home. When used with ill intent from a moving vehicle, this practice is sometimes referred to as wardriving. Apple removed all WiFi sniffing software from its App Store in March of 2010, but the iPhone has a built-in WiFi scanning feature to locate wireless hotspots.

Packet Sniffing



The terms WiFi sniffing and packet sniffing are sometimes used interchangeably, but packet sniffing does not refer to locating WiFi networks, only to monitoring activity on them. The sort of WiFi sniffing that can also be called packet sniffing is used by network administrators to find faults in a network so they can be plugged. This kind of sniffing identifies the packets of data that are being transmitted from or received by the network. The name of the tool for this job is a network analyzer when used by an authorized person, but is more likely to be called a packet sniffer when used by a thief to capture and decode other people’s data. Illegally gaining access to these packets is very similar to wire-tapping.

Preventing WiFi Sniffing



To protect a WLAN from WiFi sniffing, useful steps including changing the default administration password for the access point, such as a router, and making sure the firmware is up-to-date. One should also change the SSID (Service Set Identifier) name of the router, which is the public name and usually comes with a brand name as its default. Using network encryption and choosing Wi-Fi Protected Access (WPA), rather than Wired Equivalent Privacy (WEP), for encrypting are also good steps as well as using Secure Sockets Layer (SSL) encryption for browsing.

What Is IP Sniffing?



Internet Protocol (IP) sniffing refers to analyzing the traffic on a network. This can be limited to analyzing the traffic coming from a single computer on the network or to every computer on the network. IP sniffing intercepts packets of information on the network. This method can be used for a variety of different things.

IP sniffing can be used to detect possible intrusions on the network. By analyzing the traffic on the network, a user can detect whether or not an unauthorized user has attempted to gain access. This method can also be used for determining if authorized users on the network have been violating the network terms of use.

Other uses for IP sniffing programs involve filtering out certain types of content and connections from the network. This can be used to increase the security of a network or to limit users' access to certain types of content. Network administrators may use these programs to block connections to instant messaging services or specific websites.

IP sniffing can also be used by malicious users to steal information from other users. By intercepting network traffic, a malicious user can analyze the packets of information sent to websites. This can result in a user's account security being compromised.