Packet sniffing and spoofing are the two important concepts in
network security; they are two major threats in network
communication. Being able to understand these two threats is
essential for understanding security measures in networking.
There are many packet sniffing and spoofing tools, such as
Wireshark, Tcpdump, Netwox, etc. Some of these tools are widely
used by security experts, as well as by attackers. Being able to
use these tools is important for students, but what is more
important for students in a network security course is to
understand how these tools work, i.e., how packet sniffing and
spoofing are implemented in software.
The objective of this lab is for students to master the
technologies underlying most of the sniffing and spoofing tools.
Students will play with some simple sniffer and spoofing
programs, read their source code, modify them, and eventually
gain an in-depth understanding on the technical aspects of these
programs. At the end of this lab, students should be able to
write their own sniffing and spoofing programs.
Please find the lab description here.
Please write your lab report according to the description. Please also list the important code snippets followed by your explanation. You will not receive credit if you simply attach code without any explanation. Upload your answers as a PDF to blackboard.
Most content taken from Wenliang Du.
This work is licensed under a Creative Commons Attribution-NonCommercialShareAlike 4.0 International License. A human-readable summary of (and not a substitute for) the license is the following: You are free to copy and redistribute the material in any medium or format. You must give appropriate credit. If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original. You may not use the material for commercial purposes.