Home page logo

basics logo Security Basics mailing list archives

[Full-Disclosure] Caching a sniffer; Re:
From: "Mike Fratto" <mfratto () nwc com>
Date: Thu, 11 Mar 2004 12:43:17 -0500

-----Original Message-----
From: full-disclosure-admin () lists netsys com 
[mailto:full-disclosure-admin () lists netsys com] On Behalf Of 
Kenton Smith
Sent: Thursday, March 11, 2004 11:50 AM
To: pbruna () masev cl
Cc: Full Disclosure; SECURITY-BASICS () securityfocus com
Subject: Re: [Full-Disclosure] Caching a sniffer

I skimmed through some of the articles and they all have some 
good information. Are you running a switched network? If you 
are then the easiest way is to look at your traffic stats and 
find the port that
*all* traffic is going to.
If this doesn't make sense to you, then you should do some 
more research on sniffers.

Your assuming that the attacker 1) has control of the switch and 2) is
sniffing either the uplink or has configured the switch to mirror all the
switch ports or VLAN to the mirror port. 

Neither of which may be the case.

Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off 
any course! All of our class sizes are guaranteed to be 10 students or less 
to facilitate one-on-one interaction with one of our expert instructors. 
Attend a course taught by an expert instructor with years of in-the-field 
pen testing experience in our state of the art hacking lab. Master the skills 
of an Ethical Hacker to better assess the security of your organization. 
Visit us at: 

Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]