Throughout this book, we have looked at things from the point of view of a network administrator. But what happens when a hacker with some packet analysis knowledge decides to take a peek at what's on the wire? In this scenario we assume the identity of a hacker attempting to access sensitive information on his local company network.
Even though you're an employee of the company you are trying to break into, you have limited access to network resources. The network is a run-of-the-mill Ethernet network, and it utilizes a few switches and routers. All of the computers on the network are running various versions of Windows with access privileges defined on a per-user basis.