Home > OS >  LAN use switches, excuse me, out of "monitoring network" hackers purpose, I am grateful to
LAN use switches, excuse me, out of "monitoring network" hackers purpose, I am grateful to

Time:10-09

Suppose I hackers intentions, I installed on my machine network monitoring software, the problem is that my local area network (LAN) a computer is through the switches on the Internet, I in addition to listening to my computer to access data frames, because of switches, someone else's computer data frame, it's hard for me to listen to such limits the hackers network to monitor?



-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Switches in data link layer, by the purpose of the received data frames MAC address compared with its own address table to determine the data frame is forwarded to which port, only when the switch receives the broadcast frame or switch address table without the MAC address of the corresponding port, to get the frame to all ports broadcasting, in this way, Ethernet node is rarely receive departure for other nodes data frame,

CodePudding user response:

Arp deception
In addition, not all people using this model to get the data, you said as long as can guarantee flow that from me and leave, such as a password without wifi, does not necessarily need to take traffic, with trojans directly grasp the important information, such as direct bulk scanning IP based on vulnerability to invade others computer, or page to hang horses, software

CodePudding user response:

CodePudding user response:

Switches can be black

CodePudding user response:

Front of the Trojan horse in general, any security non-existing,
Refer to
"The matrix" fully _ _ knowledge base blog garden
In the "the matrix" zion is a virtual world _ _ knowledge base blog garden

CodePudding user response:

Is ah, have what, there is no absolute safety

CodePudding user response:

Through the arp, all traffic from my walk, you can ignore the data link layer of the equipment

CodePudding user response:

Like some institutions included personal information, then resell, finally to hackers
  • Related