jypi
ExploreChatWays to LearnAbout

jypi

  • About Us
  • Our Mission
  • Team
  • Careers

Resources

  • Ways to Learn
  • Blog
  • Help Center
  • Community Guidelines
  • Contributor Guide

Legal

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Content Policy

Connect

  • Twitter
  • Discord
  • Instagram
  • Contact Us
jypi

© 2026 jypi. All rights reserved.

You're viewing as a guest. Progress is not saved. Sign in to save progress.

NIC Modes and Tap/Mirror Concepts — The Sexy Underbelly of Packet Capture

This lesson explains how network interface card (NIC) modes and packet capture methods (hardware taps vs. port mirroring/SPAN) determine what traffic you can observe and how reliably. It covers promiscuous and monitor modes, practical trade-offs between taps and mirrors, virtual/cloud constraints, implications for encrypted traffic analysis, and detection/evasion considerations for attackers and defenders.

Content Overview

Intro and Scope

NIC Modes and Tap/Mirror Concepts — The Sexy Underbelly of Packet Capture "You can have the best packet parsing wizardry in the world, but if you can't see the packets, you're a chef without a stove." — Probably me, at 2am, with coffee and Wireshark open We're building directly on ...

Big picture: why NIC modes and tapping matter

Big picture: why NIC modes and tapping matter You can have brilliant analysis tools, signatures, and heuristics — but if your network interface never sees the traffic, none of it works. Different NIC modes determine whether your host sees just its own traffic or the whole neighborhood's cha...

NIC Modes: Promiscuous mode and nuances

NIC Modes: the cast of characters 1) Promiscuous mode What it does: The NIC hands every frame it sees up to the OS, not just frames addressed to its MAC. When it's used: Classic wired sniffing on a shared medium (or when you have a mirror/tap sending frames to you). Command examples: ...

NIC Modes: Monitor (rfmon) mode

2) Monitor (rfmon) mode What it does: Puts a wireless NIC into a mode where it captures raw 802.11 frames, including management and control frames, and frames not targeted at the NIC. When it's used: Wireless sniffing, Wi-Fi analysis, discovering hidden SSIDs, capturing handshakes for analy...

Other NIC modes and Tap vs Mirror overview

3) All-multicast, broadcast, and directed modes NICs often have smaller subsets: listening to all multicast, or only broadcast, or peer-to-peer directed traffic. Useful but less dramatic than promiscuous/monitor modes. Tap vs Mirror (SPAN) — practical options to get packets Aspect Network T...

Network Tap, Port Mirroring, and Virtual/Cloud considerations

Network Tap (hardware) Sits inline or in parallel, physically copies every bit on the medium. Great for forensic integrity: you get both directions precisely, and passive taps don't interfere with traffic. Use-case: high-fidelity capture for incident response, regulated environments. Po...

Practical differences for encrypted traffic analysis

Practical differences that matter for encrypted traffic analysis Link-layer headers: Monitor mode gives you 802.11 metadata (RSSI, sequence numbers, retry bits) — valuable for detecting anomalous wireless behavior even when payloads are encrypted. Flow metadata: Regardless of encryption, taps/m...

Detection and adversary perspectives

Detection and adversary perspectives Malware and advanced attackers may try to detect whether they're being monitored (e.g., checking NIC promiscuous flag, looking for mirrored ports, or altering behavior if virtualization/hook artifacts are present). We discussed sandbox/EDR evasion earlier ...

Practical tips & gotchas (cheat sheet)

Practical tips & gotchas (cheat sheet) Always think about where the packets leave the wire: virtual machines and containers require vSwitch config, cloud rarely gives raw pcaps. Promiscuous mode won't help on a switched port unless you have mirroring/tap. Don't assume your NIC is se...

Closing and next steps

Closing: why this matters for ethical hackers and responders Understanding NIC modes and tap/mirroring isn't just academic trivia — it's the difference between seeing the attack and saying "huh, nothing obvious," and having the evidence to reconstruct what happened. When crimina...

Choose Your Study Mode

10 study modes available based on your content

10
Chapters
24
Questions
10
Flashcards
5
Key Facts