• Title/Summary/Keyword: Sniffing

Search Result 124, Processing Time 0.032 seconds

The Implementation of Sniffing Detector and Management Tool in Local LAN (로컬 LAN환경에서의 스니핑(Sniffing) 탐지 및 관리도구 구현)

  • 김기욱;김창수;정신일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.696-699
    • /
    • 2001
  • In these days, there are explosive growths of Internet users. But the damages of hacking are on the increase lately too. Currently, many researches for detection of hacking are studying, and there are many Hacking detection tools. In this thesis, We designed and implemented Sniffing detection and Management Tool, Which ran search an invasion by sniffing in Local LAN environment. The Implementation of Sniffing Detector and Management Tool are composed of two modules. In other words, They are Sniffing Detector Tool and Sniffing Management Tool. The Sniffing Detector Tool discovers implementation of the Sniffing from optional host to Sniffing Detector host. And The Sniffing Management Tool displays information of Sniffer on Web_Browser.

  • PDF

Countermeasure of Sniffing Attack: Survey (효율적인 Sniffing 공격 대응방안 연구)

  • Hong, Sunghyuck;Seo, Yujeong
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.31-36
    • /
    • 2016
  • Sniffing attack is a passive attack which is reassembling packets to collect personal information, bank accounting number, and other important information. Sniffing attack happens in LAN and uses promiscuous mode which is opening filtering by pass all packets in LAN, attackers could catch any packets in LAN, so they can manipulate packets. They are Switch Jamming, Port mirroring, ARP Redirect, and ICMP Redirect attack. To defend these attacks, I proposed to use SSL packet encryption, reconfiguration of switching environment, DNS, and decoy method for defending all kinds of Sniffing attacks.

A Study on Keylogger Information Sniffing by Using Hooking Techniques (Hooking기술을 이용한 Keylogger 정보 Sniffing연구)

  • Park, In-woo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.119-122
    • /
    • 2012
  • Keylogger by using Hooking techniques will lead and the keyboard when inputting, private data it uses Sniffing techniques and it meat the fact that it is seized. This program the classified document where the password or the counterpart of specific program draw up or even E-mail contents or great disaster original contents confirmation it is possible it is a technique which is simple but at the slightest slip fatal one is in the use person. It considered the security book about hereupon and it studied and it made it was made to advance and with subject of character dissertation.

  • PDF

A Study of Communications Security by Using Key Generation and File Encryption (파일 암호화와 키 생성을 이용한 통신보안 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.316-319
    • /
    • 2010
  • File security is typically protected by encryption methods. The development of a network environment, such as the Internet according to the sharing of information between systems become commonplace, while providing convenience to users, individuals or organizations that facilitate access to sensitive information caused by hacking the system to attack the rapidly growing is a trend. This paper is the latest generation file system caused by the hacking attacks on the Sniffing for users using file encryption and key generation, Packet Sniffing Tool IP and data through the analysis are discussed. Through this study, the importance of protecting personal information by imprinting Proactive in the hacking incident, and what users will contribute to increase the level of security awareness.

  • PDF

A Study on 802.11 Packet Sniffing Attacks and AP Analysis on the iPhone (iPhone에서 802.11 Packet Sniffing공격과 AP분석 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.418-421
    • /
    • 2011
  • Smart Phone 사용자가 증가하고, Smart Phone을 통한 침해사고도 증가되고 있다. 특히 2010년 3분기 국내 Smart Phone의 31%를 차지하고 있는 iPhone은 사용자가 Jailbreak를 통하여 관리자 권한을 스스로 획득함으로서 이를 악용한다면 개인정보 탈취 등 침해사고의 위험이 있다. 본 논문에서는 Jailbreak 한 iPhone을 이용하여 주변의 802.11 Packet Sniffing공격을 실시하고 802.11 AP 취약점을 분석한다. 또한 Google Map을 이용해 주변의 무선 AP 위치를 파악하고 AP의 종류, 위치, 거리, MAC, SSID, RSSI, Channel, 보안설정 정보를 탈취한다. 본 논문을 통하여 스마트폰과 무선 인터넷 보안성 강화를 위한 기초 자료를 제공하게 될 것이다.

  • PDF

A study on the risk of taking out specific information by VoIP sniffing technique (VoIP 스니핑을 통한 특정정보 탈취 위험성에 관한 연구)

  • Lee, Donggeon;Choi, Woongchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.117-125
    • /
    • 2018
  • Recently, VoIP technology is widely used in our daily life. Even VoIP has become a technology that can be easily accessed from services such as home phone as well as KakaoTalk.[1] Most of these Internet telephones use the RTP protocol. However, there is a vulnerability that the audio data of users can be intercepted through packet sniffing in the RTP protocol. So we want to create a tool to check the security level of a VoIP network using the RTP protocol. To do so, we capture data packet from and to these VoIP networks. For this purpose, we first configure a virtual VoIP network using Raspberry Pi and show the security vulnerability by applying our developed sniffing tool to the VoIP network. We will then analyze the captured packets and extract meaningful information from the analyzed data using the Google Speech API. Finally, we will address the causes of these vulnerabilities and possible solutions to address them.

Efficiency of modified ramped position during the endotracheal intubation (기관내삽관 시 수정된 경사면자세의 효율성)

  • Jung, Sooyeon;Jung, Jun-Ho;Yun, Seong-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.306-308
    • /
    • 2022
  • The purpose of this study is to compare and analyze the sniffing position and the modified ramped position, which was created by using a specially designed instrument, to improve the performance of advanced airway management during endotracheal intubation. The study included 30 students from the Department of Emergency technology, N University, who had completed advanced cardiac life support and advanced airway management. The randomized crossover study was conducted with the students who were randomly assigned into two groups; Sniffing position and Modified ramped position. As a result of the study, the modified ramped position showed better glottal vision than the sniffing posture, and there was a significant difference in speed time. In the subject's subjective ease, confidence, and preference, the modified ramped position showed better results than the sniffing posture. Therefore, it is considered that modified ramped position during endotracheal intubation will help improve the performance of advanced airway management.

  • PDF

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types (위조 ARP 응답 유니캐스트 스푸핑을 이용한 서버 유형별 네트워크 해킹 및 구현기술 연구)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.61-71
    • /
    • 2017
  • ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing.

Characteristic Impact Odorants of Changpo (Acorus calamus var. angustatus Bess) Root Essential Oil

  • Choi, Hyang-Sook
    • Food Science and Biotechnology
    • /
    • v.14 no.4
    • /
    • pp.450-455
    • /
    • 2005
  • This study was conducted to determine firstly the composition of the essential oil from fresh changpo (Acorus calamus var. angustatus Bess) roots quantitatively and qualitatively by use of two internal standards, and secondly volatile compounds which are primarily responsible for the aroma of changpo roots. Simultaneous steam distillation and extraction method was used for essential oil extraction, and aroma extract dilution analysis (AEDA) and sniffing test by gas chromatography/olfactometry (GC/O) were used to detect the characteristic impact odorants. According to the instrumental analysis of changpo root essential oil, cis, trans-famesol (47.56 mg/kg of fresh wt), octanoic acid (23.73 mg/kg of fresh wt), trans-2-dodecenal (20.28 mg/kg of fresh wt) and trans, trans-farnesol (13.81 mg/kg of fresh wt) were the most abundant compounds. Geranyl acetate, trans-nerolidol and trans, trans-farnesyl acetate were evaluated as the characteristic impact odorants of changpo roots from results of AEDA and sniffing test. Especially, geranyl acetate was considered as the most similar odor component to changpo roots by organoleptic evaluation with GC/O.

Protocol Monitor System Between Cortex M7 Based PLC And HMI

  • Kim, Ki-Su;Lee, Jong-Chan;Ha, Heon-Seong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.17-23
    • /
    • 2020
  • In this paper, collecting real-time data frames that occur during RS232 communication between an HMI and PLC of automation equipment by sniffing real-time information data frames through MCU without modification of the HMI or PLC, a method is proposed that allows users to collect data without being dependent on the modification of PLC and HMI systems. The user collects necessary information from the sniffing data through the parsing operation, and the original communication interface is maintained by transmitting the corresponding sniffing frame to the destination. The MCU's UART communication interface circuit is physically designed according to the RS232 communication standard, and this additionally improves efficiency more so than an interrupt-based system by using the DMA device inside the MCU. In addition, the data frame IO operation is performed by logically separating the work of the DMA interrupt service routine from the work of the main thread using the circular queue. Through this method, the user receives the sniffing data frame between the HMI and PLC in RS232 format, and the frame transfer between PLC and HMI arrives normally at the original destination. By sniffing the data frame without further modification of the PLC and HMI, it can be confirmed that it arrives at the user system normally.