In recent years, it has been getting much easier for anyone with a portable laptop to acquire software that can capture data crossing data networks. Many vendors have created user-friendly (read easy-to-use) packet decoders that can be installed with minimal cost. These decoders were intended for troubleshooting purposes but can easily become tools for malicious intent. Packet snooping by using these decoding programs has another effect: The technique can be used in impersonation attacks, which are discussed in the next section