PrepAway - Latest Free Exam Questions & Answers

Which type of sniffing technique is generally referred as MiTM attack?

Which type of sniffing technique is generally referred as MiTM attack?

PrepAway - Latest Free Exam Questions & Answers

A.
Password Sniffing

B.
ARP Poisoning

C.
Mac Flooding

D.
DHCP Sniffing

21 Comments on “Which type of sniffing technique is generally referred as MiTM attack?

    1. Eddie Guerrero says:

      Mkdccie, It has to be B! You spoof 2 targets (arpspoof -t {IP of victimA} {IP of victimB} and vice versa) telling each victim your attacking machine is the other victim. Then turn on forwarding on your attacking machine (echo > 1 /proc/sys/net/ipv4/ip_forward) so you play traffic between victims through your attacking machine, ala MiTM when you Arp Spoof. Try this on VMWARE with 1 linux and 2 windows, put the setups in BRIDGED mode you will see.

      Mac Flooding you use to “pop” a switch into hub mode by overwheming the CAM table of a switch. You haven’t man in the middle’d with Mac flooding.

  1. RealBanda says:

    I also think it should be C because ARP poisoning finally leads to pretend to be someone and fool the other corner thus not sniffing. But on the other hand MAc flooding leads to switch to working like a hub and that means any one can sniff the network.

  2. RealBanda says:

    Sorry guys for the above explanation I finally figured it out that the answer should be B.
    Because in the question it is asking which sniffing technique is generally referred as mitm attack, not only it should be just sniffing but should be also MiTM attack. So to poison ARP table you should sniff the packets before you spoof the intended IP and update ARP table with your MAC address. So after sniff you finally acting as a Man-in-the-Middle. 😀

  3. juju says:

    I think Mac Flooding it’s not a sniffing technique (you don’t need sniff nothing for do that), but ARP Poisoning need to sniff the Mac address of both sides. For this reason I think the correct response it’s “B. ARP Poisoning”.

  4. Azuris says:

    ARP poisoning and Mac flooding both use ARP spoofing techniques.

    Lets dissect each at a time:

    ARP poisoning uses spoofed ARP’s which confuses the switch into mistakenly send frames intended for a machine to a different machine.

    MAC flooding uses spoofed ARP’s to flood a switch with fake “spoofed addresses” turning it into a hub.Its then very easy for an attacker to listen to each and every frame passing by. 🙂

    From the above:Its obvious, MAC flooding is the closest answer

  5. JQ says:

    It is definately B, no doubt. C is a sniffing attack BUT NOT A MITM ATTACK. Reason being with C, the correct machine is still getting the frame, but with ARP poisoning only the attacker gets the frame, so they are free to forward it on to the intended recipient.


Leave a Reply