• Welcome to TechPowerUp Forums, Guest! Please check out our forum guidelines for info related to our community.

small question about sniffing

s.

New Member
Joined
Feb 25, 2011
Messages
32 (0.01/day)
hello,
i want to ask if it is possible that one can sniff the first request packet that i send or he cannot???
i think he can sniff the traffic but not the request, is that right???
please if any thing not clear in my question please tell me to clear it
thanks in advance to any help
regards
 
Joined
Jan 17, 2010
Messages
12,280 (2.36/day)
Location
Oregon
System Name Juliette // HTPC
Processor Intel i7 9700K // AMD Ryzen 5 5600G
Motherboard ASUS Prime Z390X-A // ASRock B550 ITX-AC
Cooling Noctua NH-U12 Black // Stock
Memory Corsair DDR4 3600 32gb //G.SKILL Trident Z Royal Series 16GB (2 x 8GB) 3600
Video Card(s) ASUS RTX4070 OC// GTX 1650
Storage Samsung 970 EVO NVMe 1Tb, Intel 665p Series M.2 2280 1TB // Samsung 1Tb SSD
Display(s) ASUS VP348QGL 34" Quad HD 3440 x 1440 // 55" LG 4K SK8000 Series
Case Seasonic SYNCRO Q7// Silverstone Granada GD05
Audio Device(s) Focusrite Scarlett 4i4 // HDMI to Samsung HW-R650 sound bar
Power Supply Seasonic SYNCRO 750 W // CORSAIR Vengeance 650M
Mouse Cooler Master MM710 53G
Keyboard Logitech 920-009300 G512 SE
Software Windows 10 Pro // Windows 10 Pro
Its not clear...what programs, what traffic
 

s.

New Member
Joined
Feb 25, 2011
Messages
32 (0.01/day)
i mean for example when i send a traffic, that traffic contain (syn packet in TCP is the first request packet in the traffic) first request packet and the later packets is that contain the information, ok
now it is possible for some one to sniff that first request, or he can start sniffing after that packet
is it now clear please
thank you for your reply and trying to help
regards
 
Joined
Jan 14, 2009
Messages
2,644 (0.47/day)
Location
...
System Name MRCOMP!
Processor 5800X3D
Motherboard MSI Gaming Plus
Cooling Corsair 280 AIO
Memory 64GB 3600mhz
Video Card(s) GTX3060
Storage 1TB SSD
Display(s) Samsung Neo
Case No Case... just sitting on cardboard :D
Power Supply Antec 650w
im fairly certain you can sniff every single packet you send/receive. assuming this person has access to your connection locally via a hub.




to answer in a simple way, Yes. if they can sniff a packet, they can sniff every packet. it does not matter the order.
 

s.

New Member
Joined
Feb 25, 2011
Messages
32 (0.01/day)
thank you very much
ok, that is very helpful
now in the real network(leaf network)where me and many people share the same ISP (by wire or wireless), you mean that is possible here??
so that is mean sniffing can never defened, is it true
when there is an important information in the header feild (of only the first request packet(syn packet)) it can be sniff, is that right???

thank you very much for your help
best regards
 
Last edited:

Kreij

Senior Monkey Moderator
Joined
Feb 6, 2007
Messages
13,817 (2.20/day)
Location
Cheeseland (Wisconsin, USA)
Hi s,

If someone has access to the packets travelling through a network whether it's wired or wireless, they can read all the packets that are transfered over the medium if they know how to do so.

If you are worried about someone intercepting packets make sure everything that you send is encrypted. They will still get the packets but it will be very difficult for them to be able to decipher them if a good encryption method is put into place.

If the data is so extremely sensitive that you cannot risk anyone deciphering it, there are techniques for that also, but require additional communication outside the network (offline) to get the decryption information (keys) to people who will be receiving the data.
 
  • Like
Reactions: s.

s.

New Member
Joined
Feb 25, 2011
Messages
32 (0.01/day)
thank you very much for the information you explain
what i am worried about is a key in the header that i want it not to be used from other one(it was for auth. the client by the nearest router), when he know my ip address and want to know the key that associated to that ip(to use my identity), so also if i encript it i think it does not be helpful, isn't that???? because he also can use that encription with my ip together
thank you very much for your help
best regards
 

Easy Rhino

Linux Advocate
Staff member
Joined
Nov 13, 2006
Messages
15,441 (2.43/day)
Location
Mid-Atlantic
System Name Desktop
Processor i5 13600KF
Motherboard AsRock B760M Steel Legend Wifi
Cooling Noctua NH-U9S
Memory 4x 16 Gb Gskill S5 DDR5 @6000
Video Card(s) Gigabyte Gaming OC 6750 XT 12GB
Storage WD_BLACK 4TB SN850x
Display(s) Gigabye M32U
Case Corsair Carbide 400C
Audio Device(s) On Board
Power Supply EVGA Supernova 650 P2
Mouse MX Master 3s
Keyboard Logitech G915 Wireless Clicky
Software The Matrix
slyfox summed it up. you can easily intercept and read packet info with a hub if you have physical access to the network.
 

s.

New Member
Joined
Feb 25, 2011
Messages
32 (0.01/day)
so, you mean what i say is true
there is no way to prevent person who do that?
thank you for your reply
regards
 

Easy Rhino

Linux Advocate
Staff member
Joined
Nov 13, 2006
Messages
15,441 (2.43/day)
Location
Mid-Atlantic
System Name Desktop
Processor i5 13600KF
Motherboard AsRock B760M Steel Legend Wifi
Cooling Noctua NH-U9S
Memory 4x 16 Gb Gskill S5 DDR5 @6000
Video Card(s) Gigabyte Gaming OC 6750 XT 12GB
Storage WD_BLACK 4TB SN850x
Display(s) Gigabye M32U
Case Corsair Carbide 400C
Audio Device(s) On Board
Power Supply EVGA Supernova 650 P2
Mouse MX Master 3s
Keyboard Logitech G915 Wireless Clicky
Software The Matrix
the only way i think is to use SSL encryption on the LAN so at least the information is encrypted. there may be a better way.
 
  • Like
Reactions: s.

s.

New Member
Joined
Feb 25, 2011
Messages
32 (0.01/day)
thank you very much for that idea
the problem i had is i need the header to be secure, the information in the packet not matter,
i think the SSL is used to secure the info. in the packet, isn't that
best regards
 

Easy Rhino

Linux Advocate
Staff member
Joined
Nov 13, 2006
Messages
15,441 (2.43/day)
Location
Mid-Atlantic
System Name Desktop
Processor i5 13600KF
Motherboard AsRock B760M Steel Legend Wifi
Cooling Noctua NH-U9S
Memory 4x 16 Gb Gskill S5 DDR5 @6000
Video Card(s) Gigabyte Gaming OC 6750 XT 12GB
Storage WD_BLACK 4TB SN850x
Display(s) Gigabye M32U
Case Corsair Carbide 400C
Audio Device(s) On Board
Power Supply EVGA Supernova 650 P2
Mouse MX Master 3s
Keyboard Logitech G915 Wireless Clicky
Software The Matrix
hrm true i guess. are you specifically worrying about tcp packets or ip packets?
 

Easy Rhino

Linux Advocate
Staff member
Joined
Nov 13, 2006
Messages
15,441 (2.43/day)
Location
Mid-Atlantic
System Name Desktop
Processor i5 13600KF
Motherboard AsRock B760M Steel Legend Wifi
Cooling Noctua NH-U9S
Memory 4x 16 Gb Gskill S5 DDR5 @6000
Video Card(s) Gigabyte Gaming OC 6750 XT 12GB
Storage WD_BLACK 4TB SN850x
Display(s) Gigabye M32U
Case Corsair Carbide 400C
Audio Device(s) On Board
Power Supply EVGA Supernova 650 P2
Mouse MX Master 3s
Keyboard Logitech G915 Wireless Clicky
Software The Matrix
if the person has a hub on the LAN and the information is not encrypted then the person can capture all data, including the first request packet. at least that is what i believe. somebody with more network experience will know more or be able to explain it better.
 
  • Like
Reactions: s.

s.

New Member
Joined
Feb 25, 2011
Messages
32 (0.01/day)
what you try to do for me is very kind of you
and i am very thank to you
best regards
 
Joined
Nov 4, 2005
Messages
11,674 (1.73/day)
System Name Compy 386
Processor 7800X3D
Motherboard Asus
Cooling Air for now.....
Memory 64 GB DDR5 6400Mhz
Video Card(s) 7900XTX 310 Merc
Storage Samsung 990 2TB, 2 SP 2TB SSDs and over 10TB spinning
Display(s) 56" Samsung 4K HDR
Audio Device(s) ATI HDMI
Mouse Logitech MX518
Keyboard Razer
Software A lot.
Benchmark Scores Its fast. Enough.
Unless you are on a separate node you can capture all the data being transmitted across your network with a few exceptions. I can listen in at work to the data from all systems and see all the packets.

Hubs, switches, and most consumer grade devices will not route data off the network unless they are a endpoint device to the node.

Are you looking to sniff packets to determine network usage, or just hacking on neighbors networks? If you want to know network usage use a service like openDNS or buy a decent firewall and forget trying to capture data. If you are hacking a network, go away.
 
  • Like
Reactions: s.

s.

New Member
Joined
Feb 25, 2011
Messages
32 (0.01/day)
thanks for your reply
no don't worry i am not a bad person, be sure, what i am asking for is to see how can the hackers distroy my security (that is in my study)by sniffing and i need your help for that
best regards
 
Last edited:

LordJummy

New Member
Joined
May 13, 2011
Messages
1,403 (0.30/day)
Location
US of A
System Name Workstation1 | Asus G55VW-DS71
Processor i7 970 3.8GHz | i7 3610QM
Motherboard RIII Formula
Cooling EK 360 Supreme HF | Asus G55VW
Memory 24GB Dominator | 12GB DDR3
Video Card(s) 2x Diamond HD 6970 | GTX 660M
Storage 2x Vertex4 256GB | 256GB Vertex4 & 750GB HDD
Display(s) 3x Crossover 27" LED S-IPS + 30" DELL IPS
Case Corsair Obsidian 800D
Audio Device(s) X-Fi Titanium Fatal1ty Pro + Gigaworks G550W
Power Supply HX1000 + NZXT Black Sleeved Extensions
Software Win7Ult64Bit
Benchmark Scores ballz
"All those packets will be lost in time, like tears in rain"

If a packet is sent over any network, wired or wireless, someone with physical access to that network absolutely has the ability to listen in and capture all packets. Encrypted or not he can see/sniff them.

Is this a LAN or WAN? If it's a LAN, is it a simple physical network? Does it have wireless segments?

If it's a WAN things are a bit different. I saw something about a leaf network so I'm assuming this is a WAN spread out over several public networks...

I know I'm a little late to jump in here but I'm really interested in what the network layout looks like. I might have some helpful suggestions on how to circumvent this guy.
 
  • Like
Reactions: s.

s.

New Member
Joined
Feb 25, 2011
Messages
32 (0.01/day)
thank you very much for your reply
leaf network like that with the ISP , i assume it has wireless segments
thanks for your attention
 

Kreij

Senior Monkey Moderator
Joined
Feb 6, 2007
Messages
13,817 (2.20/day)
Location
Cheeseland (Wisconsin, USA)
Here is the sum total of electronic communications, s.
If you absolutely, positively cannot risk the slightest chance of someone intercepting your electronic transmission. Don't send it.
This includes internet, telephone, cell, coded CB, direct satellite or any other electronic means of communication.
If a person has enough resources and/or access to the link, they can get your transmitted data.

The only thing you can do to mitigate the problem is to encrypt all the data you can so that even if they do get it, it will be very difficult for them to decipher what you have sent.

If the person is intent upon spoofing your identity (for whatever reason) they will be able to accomplish this if they are good enough, but that too can be mitigated but is way beyond being explained here on TechPowerUp.

Even if you travel to the person who is to receive the message and tell them verbally, there are ways to listen in to the conversation, even remotely.
If the person watching you has that many resources, you are probably already compromised in many ways.

My advice ... just use a secure transport protocol and make sure both the transmitting and receiving computers are protected with good firewalls to prevent intrusion, and you should be fine.
 
  • Like
Reactions: s.

s.

New Member
Joined
Feb 25, 2011
Messages
32 (0.01/day)
thaaaaank you very much for your helpful information
best regards
 
Top