The meeting of the “Indian Libre User Group” was successfully held on March 24th 2013
Time: 2:00pm – 5.30pm
Venue: Internet Club, IInd Floor,
AMI Trust Building,Broadway Enclave,
2.30pm – 2.45pm
Customary Self Introduction. People shared their experience with Free Software
2.45pm – 4.30pm – Session by JayJacob
dSniff – Dsniff is a set of password sniffing and network traffic analysis tools written by security researcher and startup founder Dug Song to parse different application protocols and extract relevant information. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker. The applications sniff usernames and passwords, web pages being visited, contents of email, etc. Dsniff, as the name implies, is a network sniffer, but it can also be used to disrupt the normal behavior of switched networks and cause network traffic from other hosts on the same network segment to be visible, not just traffic involving the host dsniff is running on. The name “dsniff” refers both to the package as well as an included tool. “dsniff” the tool decodes passwords sent in cleartext across a switched or unswitched Ethernet network.
ARP spoofing – is a technique whereby an attacker sends fake (“spoofed”) Address resolution Protocol (ARP) messages onto a Local Area Network. Generally, the aim is to associate the attacker’s MAC address with the IP address of another host (such as the default gateway), causing any traffic meant for that IP address to be sent to the attacker instead. ARP spoofing may allow an attacker to intercept data frames on a LAN, modify the traffic, or stop the traffic altogether. Often the attack is used as an opening for other attacks, such as denial of service, man in the middle, or session hijacking attacks.The attack can only be used on networks that make use of the Address Resolution Protocol (ARP), and is limited to local network segments.
4.30pm – 4.45pm
People were requested to handle small technical discussions for the next meeting.
Thanks to all the attendees for coming and they are requested to put their feedback on the mailing list so that we can improve future meetings
The next user meet is on 28th April 2013