Saturday, November 5, 2011

Wireless Network Monitor - The Promiscuous Mode

The Promiscuous mode is a definite receive mode for network-technology devices such as wireless network cards. It is regularly used for packet sniffing and bridged network for hardware virtualization. The frames consist of the Mac (Media way Control) address of the hardware.

In this mode the gismo submits all incoming traffic to the network interface and transmits the data for processing to the operating system. Devices that use this mode can be combinations of switches and routers, network tester or even a normal computer with a association to a network.

Ac Adapter

For Wireless Lans in promiscuous mode it will only forward the packets of the network (access points) to which the client is currently connected. The Promiscuous Mode is unsuitable to receive packages from a network which you do not own because you need to authenticate yourself with the network.

The opposite of this mode is the non-promiscuous mode. In this mode the unit handles only the packets addressed to it and this happens for example in Ethernet networks, the assessment of the Mac address plus broadcast packets.

Another formula of usage is to detect network connectivity issues. Some programs use this highlight to show all that is transferred by the network and some of them can exchange passwords and data in clear text. So a normal user should stay away of this mode to preclude that man else could steal this data while the transferring process.

As you can see the Promiscuous Mode should only be used by developed users to avoid any damage to your theory or to open the door for hackers. But when you know what you are doing this mode is quite noteworthy and you can repair your network without any problem.

Of course not every wireless card drivers hold this mode because of it's not a secure mode. If you need this mode you should watch out for someone else driver that supports the Promiscuous Mode. You can contact your device's maker and ask for a new driver.

Wireless Network Monitor - The Promiscuous Mode

No comments:

Post a Comment