Packet sniffing and spoofing are the two important concepts in
network security; they are two major threats in network
communication. Being able to understand these two threats
is essential for understanding security measures in
networking. There are many packet sniffing and spoofing tools,
such as Wireshark, Tcpdump, Netwox, etc.
Some of these tools are widely used by security experts, as well as by
attackers. Being able to use these tools is important
for students, but what is more important for students in
a network security course is to understand how these tools work,
i.e., how packet sniffing and spoofing are implemented
in software.
The objective of this lab is for students to master the technologies underlying most of the sniffing and spoofing tools. Students will play with some simple sniffer and spoofing programs, read their source code, modify them, and eventually gain an in-depth understanding on the technical aspects of these programs. At the end of this lab, students should be able to write their own sniffing and spoofing programs.
Please give us your feedback on this lab using this feedback form. | |
The SEED Labs project is open source. If you are interested in contributing to this project, please check out our Github page: https://github.com/seed-labs/seed-labs. |