It is quite difficult to overcome sniffer attacks. However, the following steps can be taken as countermeasures against such attacks:

* Use encrypted protocols for all communication.
* Segment the network to limit the spread of information.
* Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
* Use a sniffer detector that checks whether an NIC is in promiscuous mode or not.
* For wireless networks, reduce the range of the network so that it can cover only the necessary surface area.

Explore More

Study on the undetectable Server Bifrost 1.2d for the AV

1. Objective Trying to make the Bifrost Server 1.2d which is the latest version of a remote control KSV undetectable to Antivirus Software Required —– description ———————————————————————— Download Bifrost 1.2dR.AT

SQL Commandos (usefull for injections)

Here is a list of SQL commands and what they do, these would be used in some injection methods and of course legitimate sql functions. On thier own they wont

Password stealing using fake login page

It’s quite easy to construct a bogus login page and steal password. Let’s look at the methods used to construct a fake login screen and how hackers steal your password.