From: "Neil Davis" <rg.viza () gmail com>
To: full-disclosure () lists grok org uk
Subject: [Full-disclosure] RE: info on ip spoofing please
Date: Wed, 12 Apr 2006 11:42:25 -0400
Received: from lists.grok.org.uk ([188.8.131.52]) by
bay0-pamc1-f9.bay0.hotmail.com with Microsoft SMTPSVC(6.0.3790.1830); Wed,
12 Apr 2006 08:43:43 -0700
Received: from lists.grok.org.uk (localhost [127.0.0.1])by
lists.grok.org.uk (Postfix) with ESMTP id AE80E7DD;Wed, 12 Apr 2006
16:42:49 +0100 (BST)
Received: from wproxy.gmail.com (wproxy.gmail.com [184.108.40.206])by
lists.grok.org.uk (Postfix) with ESMTP id A7B0B677for
<full-disclosure () lists grok org uk>;Wed, 12 Apr 2006 16:42:27 +0100 (BST)
Received: by wproxy.gmail.com with SMTP id i32so1384576wrafor
<full-disclosure () lists grok org uk>;Wed, 12 Apr 2006 08:42:25 -0700 (PDT)
Received: by 10.65.219.8 with SMTP id w8mr387592qbq;Wed, 12 Apr 2006
08:42:25 -0700 (PDT)
Received: by 10.64.47.12 with HTTP; Wed, 12 Apr 2006 08:42:25 -0700 (PDT)
X-Original-To: full-disclosure () lists grok org uk
Delivered-To: full-disclosure () lists grok org uk
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta;
X-BeenThere: full-disclosure () lists grok org uk
List-Id: An unmoderated mailing list for the discussion of security
<mailto:full-disclosure-request () lists grok org uk?subject=unsubscribe>
List-Post: <mailto:full-disclosure () lists grok org uk>
List-Help: <mailto:full-disclosure-request () lists grok org uk?subject=help>
<mailto:full-disclosure-request () lists grok org uk?subject=subscribe>
Errors-To: full-disclosure-bounces () lists grok org uk
Return-Path: full-disclosure-bounces () lists grok org uk
X-OriginalArrivalTime: 12 Apr 2006 15:43:44.0315 (UTC)
> Hello all,
> was this comment :-
> QUOTE "
> Examples of spoofing:
> packet sniffs on link between the two end points, and can therefore
> to be one end of the connection "
> My question is How can you sniff packets on a link that your machine is
> on ie NOT on the same subnet??
> Why am I at a loss to understand this. Is there a command/software that
> allows one to
> say: sniff packets on port x of IP xxx.xxx.xxx.xxx ?
> Please put me out of my agony on this.
> Thanks for any info you can give.
> Ian t
I think you misread the information, this part of it to be exact:
Examples of spoofing:
packet sniffs ____on link between the two end points____, and can
to be one end of the connection "
The answer to your question is you can't.
You can only do this on a machine that the traffic is flowing through.
Hence the name, "man-in-the-middle".
You need to comprimise a machine between the endpoints, such as a
firewall, router, or proxy, or one of the endpoints themselves so you
can sourceroute through a machine of your choosing (though if you have
comprimised an endpoint, this isn't necessary). You then run ettercap,
and can even read their SSL/SSH conversations and change data.
man-in-the-middle is a wicked attack. It's also fairly difficult to
get there, if the machines concerned are patched, up to date, and
securely configured, as so often they are not.
On ms proxy server, all you need to do is comprimise the proxy server.
The session ID's, if on query string, are logged, even when they are
via ssl, you can easily hijack a session that way, simply by looking
at the proxy log's recent entries, in a lot of cases (note: I am not
sure if ms proxy server does this on more recent versions, and I am
sure it's possible to turn this logging off). No packet analysis
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/