-
Essay / Network Security Questions and Answers - 588
a) How to collect information from encrypted network traffic? An attacker looks for misconfigured network devices to exploit. Common vulnerabilities include weak installation defaults, wide open access controls, and unpatched devices. To collect information about encrypted network traffic, the attacker places the packet detection tool on the network. Sniffing involves monitoring network traffic for data such as clear text passwords or other configuration credentials. Information typically transmitted during a Secure SHELL session cannot be seen, but other information such as sender and recipient IP addresses, DNS queries to resolve hostname, port numbers and the amount of data are visible. If network traffic is encrypted by the attacker, the attacker can see which sites are visited, the amount of data received and sent, and the port numbers used for the connection. Using a simple packet sniffer, all clear text traffic can be read easily. This becomes possible due to weak physical security or lack of encryption during the sending process....