First, to prevent ARP spoofing is the correct solution
Speaking of this MSN listening event, people often point to MSN Chat Monitor & Sniffer, it should be because of the name of the software and its own functions. In fact, the real behind-the-scenes murderer for the switched LAN is someone else.
In a previous article, some experts said that MSN monitoring software is basically a network tool that uses network listening, protocol analysis, and content restoration mechanisms. This kind of listening tool is basically based on a shared network, and the network data is sent by broadcast. Therefore, each network card connected to a HUB can receive all the intranet communication, as long as the network card is set to the promiscuous mode, Listening to all communications, since the late 1990s, HUB has basically been replaced by switches. If the general listener is only listening locally, then as long as the network hub device is not a HUB, he can only see his own communication. This is the case, in the switched LAN, the listener can only use MSN Chat Monitor & Sniffer to actually listen to their own chat.
But as long as you run an ARP spoofing software on your machine, the results are completely different. After ARP spoofing, anyone on the LAN can use MSN Chat Monitor & Sniffer to listen to MSN users on the LAN. In fact, ARP spoofing is not only used for MSN monitoring, but also with other monitoring tools to implement various monitoring in the LAN. The focus of this article is on how to defend against MSN domain listening in the LAN. Therefore, the principle of ARP spoofing is not detailed.
It can be seen that to prevent MSN snooping or other monitoring in the local area, it is necessary to prevent ARP spoofing. For the working principle of ARP, we only need to bind the MAC address to the IP address. The binding method is to input: arp -s native IP local MAC address in the DOS command interface.
At the same time, we can also use software to defend against ARP spoofing. Anti ARP Sniffer is one of the more common software. After running the software, you only need to fill in the IP address of the gateway. The software will automatically find the MAC address of the gateway, and then fill in the MAC address of the machine to start protection. When someone performs an ARP spoofing attack, the software can also record the attacker's MAC address and give a prompt. Therefore, this software can also promote some machines in the local area with ARP addressing.
Second, MSN Messenger text encryption
Because MSN Messenger is sent in clear text and is easily intercepted, there is basically no security for the user's privacy. Therefore, the user's communication content can be protected by encrypting the text.
1, MSN comes with encryption function
Although the current Windows Live Messenger transfer text is still sent in clear text, but in MSN Messnger 7.5 or higher version already has text encryption. In this way, both parties will be helpless if they use the encryption method. There are many ways to initiate an encrypted chat, the most straightforward of which is: right click on an online friend in the buddy list - select "Start an event" - select "whisper (encryption)" in the pop-up window.
2. Software Encryption
Secway has developed encryption tools for instant messaging software such as MSN Messenger, Yahoo messenger, ICQ, AIM, etc. Users can choose according to their own habits. Introduced here is an integrated version of Simp Pro, which combines the encryption features of common IM tools. The feature of this IM text encryption tool is that both the sender and the receiver need to install this software to achieve the purpose of encryption.
The installation process basically belongs to the "Next" all the way, during which the user will choose the Internet access mode and which IM tools are installed on the machine. Because Simp Pro uses RSA encryption, it will generate one for each user after installation. Group key, in order to prevent others from using the key, the user is also required to set a password for Simp Pro during the installation process.
All protected IMs will be automatically re-logged in after Simp Pro is installed. If both parties have Simp Pro installed, a dialog box will pop up on the first call, asking the user to handle the other party's key: accept, accept, reject, and reject forever. After the two parties acknowledged the other party's key, the text sent between them began to be protected by encryption.