Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Promiscuous Mode

Posted on by

A Computer Network is collection of computing nodes connected through a switch or hub. Data is sent from a system (sender) to another system (receiver). At the layer 2 of the OSI layer, packet is converted into a frame which has the Source Hardware Address and Destination Hardware Address. In Ethernet based LAN, MAC address is the hardware address. All nodes have NIC (Network Interface Card) connected to the port of a switch or hub and each node keeps listening to data on the network. If there are any frames which has destination MAC address matching to it’s NIC’s MAC address, the node picks the frame and sends the frame up into the OSI layer for further processing.

In promiscuous mode, a node puts it’s NIC in a special mode that listens and captures all traffic coming on the port that it is connected even, if the destination MAC address in the frame doesn’t match to it’s NIC MAC address.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme