How to protect your private network from break-ins | Real experiment with a hacker

👾 Follow this link to book a demo: In this video, you’ll find out about how sniffing with twisted pairs works and what danger it poses to your data. Sniffing is a kind of attack that involves listening in our data, transmitted through the network. Hackers can, with the help of special tools or software, eavesdrop on traffic and watch in real time what information is coming in and out of the computer. Your passwords, documents, photos, any and everything could end up in the hands of another person. For some reason, people often think that this requires some kind of expensive tools or equipment. But in this video you’ll see how hackers can eavesdrop on network traffic using simple crocodile clips. Most importantly, we’ll show you how to stay protected against these kind of attacks. 👾 More about us: Timecodes: 00:00 The hacker is in search of a victim 02:01 Let’s start with the theory, what is RJ45 03:02 How information travels through the wires 04:13 How a hacker ‘sniffs’ information. Let’s start to assemble our tools! 05:20 How the attack works, as shown on our special testbed 06:20 Listening to outgoing traffic 09:20 Using a special script to search for sensitive information 11:40 Listening to the outgoing traffic and intercepting valuable data 13:47 The vulnerabilities of sniffing attacks and how to protect yourself against them 18:28 What measures do we take to protect data at Sumsub? #sniffingattack #hardwaresniffingattack #howtohack #ethicalhacking #maninthemiddle #capturetraffic #rj45 #twistedpair #ethernetcable #cybersecurity #sumsub
Back to Top