Symbianize Forum

Most of our features and services are available only to members, so we encourage you to login or register a new account. Registration is free, fast and simple. You only need to provide a valid email. Being a member you'll gain access to all member forums and features, post a message to ask question or provide answer, and share or find resources related to mobile phones, tablets, computers, game consoles, and multimedia.

All that and more, so what are you waiting for, click the register button and join us now! Ito ang website na ginawa ng pinoy para sa pinoy!

Sniffing, snooping & spoofing on May 9 election, pag usapan natin.

d1881b

Recruit
Basic Member
Messages
5
Reaction score
0
Points
16
Gaano ba ka-epektibo ang ganitong pamamaraan sa pagmamaneobra ng automated May 9 Election?
Pag-usapan po natin para mapaghandaan

SNIFFING
A sniffer is a piece of software that grabs all of the traffic flowing into and out of a computer attached to a network. They are available for several platforms in both commercial and open-source variations.

A sniffer (packet sniffer) is a tool that intercepts data flowing in a network. If computers are connected to a local are network that is not filtered or switched, the traffic can be broadcast to all computers contained in the same segment. This doesn’t generally occur, since computers are generally told to ignore all the comings and goings of traffic from other computers. However, in the case of a sniffer, all traffic is shared when the sniffer software commands the Network Interface Card (NIC) to stop ignoring the traffic. The NIC is put into promiscuous mode, and it reads communications between computers within a particular segment. This allows the sniffer to seize everything that is flowing in the network, which can lead to the unauthorized access of sensitive data. A packet sniffer can take the form of either a hardware or software solution.
Sniffing, snooping & spoofing on May 9 election, pag usapan natin.

A sniffer is also known as a packet analyzer.

SNOOPING
Data snooping refers to statistical inference that the researcher decides to perform after looking at the data (as contrasted with pre-planned inference, which the researcher plans before looking at the data).

Snooping protocol is for maintaining cache coherency in symmetric multiprocessing environments. In a snooping system, all caches on the bus monitor (or snoop) the bus to determine if they have a copy of the block of data that is requested on the bus. Every cache has a copy of the sharing status of every block of physical memory it has. Multiple copies of a document in a multiprocessing environment typically can be read without any coherence problems; however, a processor must have exclusive access to the bus in order to write.
There are two types of snooping protocol:

* write-invalidate: the processor that is writing data causes copies in the caches of all other processors in the system to be rendered invalid before it changes its local copy. The local machine does this by sending an invalidation signal over the bus, which causes all of the other caches to check for a copy of the invalidated file. Once the cache copies have been invalidated, the data on the local machine can be updated until another processor requests it.
* write-update: the processor that is writing the data broadcasts the new data over the bus (without issuing the invalidation signal). All caches that contain copies of the data are then updated. This scheme differs from write-invalidate in that it does not create only one local copy for writes.

SPOOFING
A spoofing attack is when a malicious party impersonates another device or user on a network in order to launch attacks against network hosts, steal data, spread malware or bypass access controls. There are several different types of spoofing attacks that malicious parties can use to accomplish this.

A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.
 
pwede din through gsm signals ma intercept. Yung kali linux meron sya gsm snooping capability ang hardware na gamit yun isdb-t na usb dongle pero more on read lang sya wala sya pang send ng signal. Yung pixie cell site router parang mini cell site ginagamit to sa u.s. sa mga remote areas na hindi abot ng cellsite pero may landline sa bahay nahahack to kasi linux based box sya
at pwede ridirect yun mga nakaconnect sa pixie sa wireshark or any packet network software to edit packet or data. ngayon sa crypto encryption naman kung luma parin gamit ng comelec baka may vulnerabilities na yun encryption gamit nila. pwede din sabotahe yun vpn ddos. sana lang gumamit sila thru satellite transmission kasi sobra hina na security sa gsm
 
Back
Top Bottom