Packet Sniffing: Security Vulnerabilities and Hardening,

Wednesday, September 8th, 2004 at 6:00 PM

TI Auditorium


Speaker: Laura Chappell

Bio: As the Sr. Protocol Analyst and founder of the Protocol Analysis Institute, Laura writes, lectures and advises on network troubleshooting, optimization, and security. She is an active member of HTCIA (High Technology Crime Investigation Association) and an IEEE Associate since 1990.

Ms. Chappells books include several best-sellers for IDG Books (Novells Guide to IPX/SPX Analysis) and Macmillan Technical Publishing (Introduction to Cisco Router Configurations). She also writes regularly for Novell Connection magazine and Network World magazine. Ms. Chappells clients include many Fortune 100 companies as well as local, national and international law enforcement and government institutions.

Additionally, Ms. Chappell is the founder of and Technical Advisor for, an Internet-based publishing company focused on packet-level communications and security. You can learn more on her company website at

Title: Packet Sniffing: Security Vulnerabilities and Hardening,

Abstract: Packet sniffers have been well established as standard tools for network troubleshooting. Unfortunately, they have also been used to intercept unsecure network traffic, sniff passwords and (with some slight added functionality), alter the contents of traffic as it flows through the network. In this session, Ms. Chappell examines how attackers can use packet sniffers to compromise network security (even on switched networks) using actual network traffic traces and demonstrations. In addition, she will list some of the tasks that can be performed to check network security and integrity using these same tools.