Bugtraq mailing list archives
Defeating (or at least confusing) neped.c
From: smm () WPI EDU (Seth McGann)
Date: Fri, 18 Sep 1998 12:03:18 -0400
<snip> /* ----------------------------------------- Network Promiscuous Ethernet Detector. Linux 2.0.x / 2.1.x, libc5 & GlibC ----------------------------------------- (c) 1998 savage () apostols org ----------------------------------------- Scan your subnet, and detect promiscuous linuxes. It really works, not a joke. ----------------------------------------- [ http://www.rootshell.com/ ] <snip> This nifty program was released on rootshell a few days ago. I'm suprised it hasn't got more play on bugtraq yet. Using the ARP protocol, it is apparently possible to tell which machines on a subnet are sniffing. Without going into the details of how exactly this detector works (mainly because I'm not quite sure myself) it is possible to defeat the detector by having your machine be shown as a false negative. <Hax0r> # /sbin/ifconfig eth0 -arp <Hax0r> # ./evilsniffer -i eth0 Now the interface will not respond to ARP queries, thus no detection. Not responding to ARP requests is suspicious but the fact remains that you can't be sure whether or not someone is sniffing. Additionally, this program apparently will not detect sniffers on your own machine, but if that is the case you have bigger problems anyway. Seth M. McGann / smm () wpi edu "Security is making it http://www.wpi.edu/~smm to the bathroom in time." KeyID: 2048/1024/E2501C80 Fingerprint 3344 DFA2 8E4A 977B 63A7 19E3 6AF7 4AE7 E250 1C80
Current thread:
- Re: Buffer overflows in Minicom 1.80.1 M.C.Mar (Aug 31)
- <Possible follow-ups>
- Re: Buffer overflows in Minicom 1.80.1 M.C.Mar (Sep 02)
- Re: Buffer overflows in Minicom 1.80.1 Patrick J. Volkerding (Sep 02)
- Re: Buffer overflows in Minicom 1.80.1 Patrick J. Volkerding (Sep 02)
- Re: Buffer overflows in Minicom 1.80.1 Patrick J. Volkerding (Sep 02)
