Eavesdropping vs. sniffing
Clash Royale CLAN TAG#URR8PPP
up vote
2
down vote
favorite
I'm taking a coursera course, and they take pains when talking about network security to distinguish between eavesdropping and sniffing.
According to their definitions, sniffing involves reading or monitoring whole packets, whereas eavesdropping seems like it differs mostly by 1. finding incomplete packets rather than complete ones, and 2. using Ettercap in addition to technologies like tcpdump and and wireshark.
Are these definitions standard? I'm not finding a lot of definitional convergence elsewhere on the internet about these terms.
attacks terminology
add a comment |Â
up vote
2
down vote
favorite
I'm taking a coursera course, and they take pains when talking about network security to distinguish between eavesdropping and sniffing.
According to their definitions, sniffing involves reading or monitoring whole packets, whereas eavesdropping seems like it differs mostly by 1. finding incomplete packets rather than complete ones, and 2. using Ettercap in addition to technologies like tcpdump and and wireshark.
Are these definitions standard? I'm not finding a lot of definitional convergence elsewhere on the internet about these terms.
attacks terminology
1
Congrats on taking a course to improve your knowledge!
– Daisetsu
3 hours ago
Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
– Daisetsu
3 hours ago
They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
– fox
13 mins ago
add a comment |Â
up vote
2
down vote
favorite
up vote
2
down vote
favorite
I'm taking a coursera course, and they take pains when talking about network security to distinguish between eavesdropping and sniffing.
According to their definitions, sniffing involves reading or monitoring whole packets, whereas eavesdropping seems like it differs mostly by 1. finding incomplete packets rather than complete ones, and 2. using Ettercap in addition to technologies like tcpdump and and wireshark.
Are these definitions standard? I'm not finding a lot of definitional convergence elsewhere on the internet about these terms.
attacks terminology
I'm taking a coursera course, and they take pains when talking about network security to distinguish between eavesdropping and sniffing.
According to their definitions, sniffing involves reading or monitoring whole packets, whereas eavesdropping seems like it differs mostly by 1. finding incomplete packets rather than complete ones, and 2. using Ettercap in addition to technologies like tcpdump and and wireshark.
Are these definitions standard? I'm not finding a lot of definitional convergence elsewhere on the internet about these terms.
attacks terminology
attacks terminology
asked 4 hours ago
fox
1284
1284
1
Congrats on taking a course to improve your knowledge!
– Daisetsu
3 hours ago
Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
– Daisetsu
3 hours ago
They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
– fox
13 mins ago
add a comment |Â
1
Congrats on taking a course to improve your knowledge!
– Daisetsu
3 hours ago
Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
– Daisetsu
3 hours ago
They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
– fox
13 mins ago
1
1
Congrats on taking a course to improve your knowledge!
– Daisetsu
3 hours ago
Congrats on taking a course to improve your knowledge!
– Daisetsu
3 hours ago
Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
– Daisetsu
3 hours ago
Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
– Daisetsu
3 hours ago
They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
– fox
13 mins ago
They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
– fox
13 mins ago
add a comment |Â
1 Answer
1
active
oldest
votes
up vote
2
down vote
accepted
Both are same kind of attacks. The difference is Eavesdropping could be in any form (Physical to logical), where the sniffing is more electronics/network related term.
add a comment |Â
1 Answer
1
active
oldest
votes
1 Answer
1
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
2
down vote
accepted
Both are same kind of attacks. The difference is Eavesdropping could be in any form (Physical to logical), where the sniffing is more electronics/network related term.
add a comment |Â
up vote
2
down vote
accepted
Both are same kind of attacks. The difference is Eavesdropping could be in any form (Physical to logical), where the sniffing is more electronics/network related term.
add a comment |Â
up vote
2
down vote
accepted
up vote
2
down vote
accepted
Both are same kind of attacks. The difference is Eavesdropping could be in any form (Physical to logical), where the sniffing is more electronics/network related term.
Both are same kind of attacks. The difference is Eavesdropping could be in any form (Physical to logical), where the sniffing is more electronics/network related term.
answered 3 hours ago
Kay
1163
1163
add a comment |Â
add a comment |Â
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f195276%2feavesdropping-vs-sniffing%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
1
Congrats on taking a course to improve your knowledge!
– Daisetsu
3 hours ago
Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
– Daisetsu
3 hours ago
They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
– fox
13 mins ago