Sniffing Concepts | |-- Network Sniffing | |-- Definition | |-- Differences between Hub and Switch | |-- Packet Sniffing Programs | |-- Types of Sniffing | |-- Passive Sniffing | |-- Active Sniffing | |-- Protocols Vulnerable to Sniffing | |-- Telnet and Rlogin | |-- HTTP | |-- SNMP | |-- SMTP | |-- NNTP | |-- POP | |-- FTP | |-- IMAP | |-- Sniffing in the Data Link Layer | |-- Hardware Protocol Analyzers | |-- Examples | |-- SPAN Port | |-- Wiretapping | |-- Types of Wiretapping | |-- Active Wiretapping | |-- Passive Wiretapping | |-- Lawful Interception | |-- Sniffing Techniques | |-- MAC Attack