When any data has to be transmitted over the computer network, it is broken down into smaller units at the sender’s node called data packets and reassembled at receiver’s node in original format. It is the smallest unit of communication over a computer network. It is also called a block, a segment, a datagram or a cell. The act of capturing data packet across the computer network is called packet sniffing. It is similar to as wire tapping to a telephone network. It is mostly used by crackers and hackers to collect information illegally about network. It is also used by ISPs, advertisers and governments.
ISPs use packet sniffing to track all your activities such as:
- who is receiver of your email
- what is content of that email
- what you download
- sites you visit
- what you looked on that website
- downloads from a site
- streaming events like video, audio, etc.
Advertising agencies or internet advertising agencies are paid according to:
- number of ads shown by them.
- number of clicks on their ads also called PPC (pay per click).
To achieve this target, these agencies use packet sniffing to inject advertisements into the flowing packets. Most of the time these ads contain malware.
Government agencies use packet sniffing to:
- ensure security of data over the network.
- track an organisation’s unencrypted data.
Packet Sniffer –
Packet sniffing is done by using tools called packet sniffer. It can be either filtered or unfiltered. Filtered is used when only specific data packets have to be captured and Unfiltered is used when all the packets have to be captured. WireShark, SmartSniff are examples of packet sniffing tools.
How to prevent packet sniffing –
- Encrypting data you send or receive.
- using trusted Wi-Fi networks.
- Scanning your network for dangers or issues.