It is quite difficult to overcome sniffer attacks. However, the following steps can be taken as countermeasures against such attacks:

* Use encrypted protocols for all communication.
* Segment the network to limit the spread of information.
* Use switches instead of hubs since they switch communications, which means that information is delivered only to the predefined host.
* Use a sniffer detector that checks whether an NIC is in promiscuous mode or not.
* For wireless networks, reduce the range of the network so that it can cover only the necessary surface area.

Explore More

Hack Tools, Utilities and Exploits

Packetstorm Last 10 Files glsa-200901-13.txt – Gentoo Linux Security Advisory GLSA 200901-13 – Multiple vulnerabilities have been discovered in Pidgin, allowing for remote arbitrary code execution, denial of service and

Torrent Poisoning

=== Introduction === The BitTorrent protocol identifies peers using a tracker. Each peer announces itself to the tracker via HTTP. Certain parameters in the announce request itself can be altered

How to hack?

This is a tutorial I found on the net. This tutorial will explain to you how to hack someone’s internet account thru his router.This hack is based on a secuirty