Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Eavesdropping

Posted on by

Eavesdropping is the act of intercepting the conversation between two systems. A hacker intercepts the session between two machines. After interception, the attacker can gain access to data or modify the data or delete the data. The interception can be simple as like over hearing two people talking or sophisticated like intercepting an application session or network flow between two computing nodes.

Types of Eavesdropping

Passive Eavesdropping is where the attacker passively just listens to the conversation between two parties.

Active Eavesdropping is where the attacker actively intercepts the communication between two parties. After interception, the attacker can read, change or delete the data.

Eavesdropping Techniques

Verbal Eavesdropping is over hearing two people talking.

Social Eavesdropping is listening to group of people talking.

Email Eavesdropping is intercepting email when sent between users.

Phone Eavesdropping is tapping and listening to digital/analog phone conversation between parties.

VoIP Eavesdropping is tapping and listening to Voice Over IP conversation between parties.

Sniffing also referred as Network Sniffing is listening network traffic through switches and hubs.

MITM (Man-In-Middle-Attack) is intercepting and listening/altering the traffic between two parties.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme