Eavesdropping vs. sniffing

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
2
down vote

favorite












I'm taking a coursera course, and they take pains when talking about network security to distinguish between eavesdropping and sniffing.



According to their definitions, sniffing involves reading or monitoring whole packets, whereas eavesdropping seems like it differs mostly by 1. finding incomplete packets rather than complete ones, and 2. using Ettercap in addition to technologies like tcpdump and and wireshark.



Are these definitions standard? I'm not finding a lot of definitional convergence elsewhere on the internet about these terms.










share|improve this question

















  • 1




    Congrats on taking a course to improve your knowledge!
    – Daisetsu
    3 hours ago










  • Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
    – Daisetsu
    3 hours ago











  • They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
    – fox
    13 mins ago














up vote
2
down vote

favorite












I'm taking a coursera course, and they take pains when talking about network security to distinguish between eavesdropping and sniffing.



According to their definitions, sniffing involves reading or monitoring whole packets, whereas eavesdropping seems like it differs mostly by 1. finding incomplete packets rather than complete ones, and 2. using Ettercap in addition to technologies like tcpdump and and wireshark.



Are these definitions standard? I'm not finding a lot of definitional convergence elsewhere on the internet about these terms.










share|improve this question

















  • 1




    Congrats on taking a course to improve your knowledge!
    – Daisetsu
    3 hours ago










  • Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
    – Daisetsu
    3 hours ago











  • They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
    – fox
    13 mins ago












up vote
2
down vote

favorite









up vote
2
down vote

favorite











I'm taking a coursera course, and they take pains when talking about network security to distinguish between eavesdropping and sniffing.



According to their definitions, sniffing involves reading or monitoring whole packets, whereas eavesdropping seems like it differs mostly by 1. finding incomplete packets rather than complete ones, and 2. using Ettercap in addition to technologies like tcpdump and and wireshark.



Are these definitions standard? I'm not finding a lot of definitional convergence elsewhere on the internet about these terms.










share|improve this question













I'm taking a coursera course, and they take pains when talking about network security to distinguish between eavesdropping and sniffing.



According to their definitions, sniffing involves reading or monitoring whole packets, whereas eavesdropping seems like it differs mostly by 1. finding incomplete packets rather than complete ones, and 2. using Ettercap in addition to technologies like tcpdump and and wireshark.



Are these definitions standard? I'm not finding a lot of definitional convergence elsewhere on the internet about these terms.







attacks terminology






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked 4 hours ago









fox

1284




1284







  • 1




    Congrats on taking a course to improve your knowledge!
    – Daisetsu
    3 hours ago










  • Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
    – Daisetsu
    3 hours ago











  • They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
    – fox
    13 mins ago












  • 1




    Congrats on taking a course to improve your knowledge!
    – Daisetsu
    3 hours ago










  • Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
    – Daisetsu
    3 hours ago











  • They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
    – fox
    13 mins ago







1




1




Congrats on taking a course to improve your knowledge!
– Daisetsu
3 hours ago




Congrats on taking a course to improve your knowledge!
– Daisetsu
3 hours ago












Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
– Daisetsu
3 hours ago





Based on how you described it, they could be talking about the difference between active (intercepting traffic via a man-in-the-middle attack arp poison using ettercap) and passive monitoring which is whats seen incidentally like listening to a WiFi connection which you have the key for. If you would post an example of their definitions that may clear it up a bit more.
– Daisetsu
3 hours ago













They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
– fox
13 mins ago




They actually distinguish between active attacks that shape traffic vs. passive attacks that do things like observe data use and reuse cookies / credentials elsewhere.
– fox
13 mins ago










1 Answer
1






active

oldest

votes

















up vote
2
down vote



accepted










Both are same kind of attacks. The difference is Eavesdropping could be in any form (Physical to logical), where the sniffing is more electronics/network related term.






share|improve this answer




















    Your Answer







    StackExchange.ready(function()
    var channelOptions =
    tags: "".split(" "),
    id: "162"
    ;
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function()
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled)
    StackExchange.using("snippets", function()
    createEditor();
    );

    else
    createEditor();

    );

    function createEditor()
    StackExchange.prepareEditor(
    heartbeatType: 'answer',
    convertImagesToLinks: false,
    noModals: false,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: null,
    bindNavPrevention: true,
    postfix: "",
    noCode: true, onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    );



    );













     

    draft saved


    draft discarded


















    StackExchange.ready(
    function ()
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f195276%2feavesdropping-vs-sniffing%23new-answer', 'question_page');

    );

    Post as a guest






























    1 Answer
    1






    active

    oldest

    votes








    1 Answer
    1






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes








    up vote
    2
    down vote



    accepted










    Both are same kind of attacks. The difference is Eavesdropping could be in any form (Physical to logical), where the sniffing is more electronics/network related term.






    share|improve this answer
























      up vote
      2
      down vote



      accepted










      Both are same kind of attacks. The difference is Eavesdropping could be in any form (Physical to logical), where the sniffing is more electronics/network related term.






      share|improve this answer






















        up vote
        2
        down vote



        accepted







        up vote
        2
        down vote



        accepted






        Both are same kind of attacks. The difference is Eavesdropping could be in any form (Physical to logical), where the sniffing is more electronics/network related term.






        share|improve this answer












        Both are same kind of attacks. The difference is Eavesdropping could be in any form (Physical to logical), where the sniffing is more electronics/network related term.







        share|improve this answer












        share|improve this answer



        share|improve this answer










        answered 3 hours ago









        Kay

        1163




        1163



























             

            draft saved


            draft discarded















































             


            draft saved


            draft discarded














            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsecurity.stackexchange.com%2fquestions%2f195276%2feavesdropping-vs-sniffing%23new-answer', 'question_page');

            );

            Post as a guest













































































            Comments

            Popular posts from this blog

            What does second last employer means? [closed]

            List of Gilmore Girls characters

            Confectionery