Clear Text Protocol handles data over any network without
any transformation or encryption. The attacker will eavesdrop on the communication which is
performing an unwanted attack in a way.
Because whatever data is written in human languages, its nature's
according cleartext protocol can be intercepted, eavesdrop and mangle very
easily. Because the data that is being translated is not encrypted information
on the boon network, public network or private network. If there is absolutely
no alternative to a clear text protocol you should use it only on trusted
network.
A cryptographic protocol provides
services by encrypting any data or information over a network
with tight security. Cryptographic protocols have
many different goals one of them is to prevent is eavesdropping.
Eavesdropping that's mean is an attack also known
as sniffing or snooping attack, is a theft of information as it
is transmitted over the network by a
computer, smartphone or another connected device that
attackers takes advantage of unsecured
network communications to access data as it is being sent or
received by its user.
If an attacker
intercept the traffic, they will not be able to understand it.
If you need to transmit private information such as username and
password, then you should always use cryptographic protocol, this
cryptographic protocol allows over the network communication with tight
security.
What if you need to run a clear text protocol on an untrusted network?
You can wrap (tunnel) a clear text protocol into a cryptographic
one.
A great example of protocol tunneling is a VPN.
A
virtual Private Network (VPN) uses cryptography to extend a private network over the public
one, like the internet. The extension is made by performing a
protected connection to a private
network (such as your office or home network). From the client
point of view, being in the VPN is the same as being directly
connected to the private network.
Disclaimer
All tutorials are for informational and educational purposes only and have
been made using our own routers, servers, websites and other vulnerable free
resources. we do not contain any illegal activity. We believe that ethical
hacking, information security and cyber security should be familiar subjects
to anyone using digital information and computers.
Hacking Truth is
against misuse of the information and we strongly suggest against it. Please
regard the word hacking as ethical hacking or penetration testing every time
this word is used. We do not promote, encourage, support or excite any illegal
activity or hacking.
0 comments:
Post a Comment
For Any Tech Updates, Hacking News, Internet, Computer, Technology and related to IT Field Articles Follow Our Blog.