Sniffers

sniffing dog

Written by David M. Stone, University Laboratory High School, Urbana, IL


Introduction

"Sniffer" is a generic term for computer programs which allow individuals to gather information regarding the status of components of a network system. In terms of computer crime, illegal sniffers are computer programs which search individual packets of information as they pass through various packet switching networks such as school servers or the Internet (Fighting Computer Crime: A New Framework for Protecting Information,1998). Written by computer hackers, illegal sniffers covertly capture information about an individual's computer or log user submitted information.

The structure of the Internet requires information to flow from computer node to computer node in its journey to its final destination. Illegal sniffers can be located at any of those nodes, stationed as phantom (invisible) nodes connected to a network, or act as Trojan horses within legitimate software. Information detectable by illegal sniffers can be used to remotely operate another's computer (or its associated server) for illicit purposes, steal passwords for access to privileged information or steal confidential information, such as credit card numbers submitted for online purchases.


Issues

Issues involving illegal sniffers are virtually nonexistent. Each of these different types of code provide no benefit whatsoever, and are clearly the efforts of individuals (malicious hackers) whose primary interest is gaining access privileges, impersonation or illegal economic gain.


Minimizing Potential Sniffer Encounter and Impact

Currently it appears that the best way to minimize sniffer interaction is by use of current high quality encryption software, which scrambles information so it cannont be translated by the sniffer. PGP (Pretty Good Protection) is an excellent encryption program to consider. Individuals desiring more information about PGP may want to consider reading "PGP : Pretty Good Privacy" (1995) by Simson Garfinkel. It is likely that hackers will constantly be upgrading the capabilities of their sniffers, requiring school and businesses to regularly upgrade encryption software.


Annotated Web Sites

Introduction to Encryption (http://www.symantec.com/avcenter/security/encryption/encryption.html)
A good, very concise overview of encryption. Produced by Symantec, top producer of security software.

Digital Key Security (http://cc.weber.edu/~itfm/hottopic/DIGITALK/digitalk2.htm)
Don't let the title scare you - this is an exceptionally well written web document which explains how encryption works. This site has a number of excellent links pertaining to each area discussed.

Progress Towards Strong Encryption (http://www.icsa.net/library/research/b.shtml)
An excellent introduction to recent encryption development technologies, best suited for intermediate to advanced users with some background in encryption.

PGP and What It Does (http://www.arc.unm.edu/~drosoff/pgp/pgp.html)
An outstanding introduction to encryption and the software program PGP.


Return to Educator's Guide to Computer Crime and Technology Misuse

Graphics From Fuzzy Faces Free Doggy Graphics

Developed 3/15/99. Last modified 5/9/99.