Packet Sniffing

12th February 2020 | Cybrary Packet Sniffing


Packet Sniffing is the practice of gathering, collecting, and logging the packets that pass through a computer network, regardless of how the packet is addressed. In this way, every packet may be gathered for further analysis. Network administrators use this data to monitor bandwidth and traffic in the network. 

A packet sniffer, also known as a packet analyzer, is made up of two parts. The first part is a network adapter that allows the sniffer to connect to the existing network. The second, is the software behind the sniffing that gives administrators a way to look at and analyze the data coming through their network.  

Source: Paessler

Related Terms: ICMP,  Intrusion Detection System, Intrusion Prevention Systems, TCP, UDP

Should SMB’s be concerned about Packet Sniffing?

No. Packet Sniffing is a detective capability that network engineers use to identify and fix problems in your environment. These capabilities are reserved to specialists that you would call in or a vendor supporting you that your company would rely upon. Having someone who can perform Packet Sniffing analysis on your network is largely overkill unless that person was responsible for many other things within your SMB. 

Packet Sniffing Capabilities and Managed Service Provider (MSP) Benefits:

On the other hand, most Managed Service Providers have a seasoned network engineer who can perform packet sniffing and analysis to identify critical bandwidth problems, poor application performance issues, and identify the root cause of networking issues.  This is one of the many benefits of working with Manager Services Providers on your IT infrastructure for IT planning, IT troubleshooting, and vendor management.

To learn more about Packet Sniffing, watch this short 5 min video:

https://www.youtube.com/watch?v=V3C5Y2NXU68

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Part 2 of Our Microsoft Entra Security Series In Part 1, we explored how Microsoft’s Token Protection...

Read more
Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more