Penetration Testing mailing list archives

RE: arpspoofing


From: Darrin.Wassom () spectrum-health org
Date: Mon, 11 Feb 2002 14:14:09 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Not sure if this has been covered but a network tap could also be
installed between the inbound or outbound traffic and the switch.
They are relatively inexpensive, reliable and a breeze to install.
Check out Finisar Systems or Netoptics for models and pricing..

Darrin Wassom - Sr. Systems Security Engineer
Information Security Compliance Team
Spectrum Health I&TM
phone: 616.391.9031 - fax: 616.391.3496
darrin.wassom () spectrum-health org

- -----Original Message-----
From: Lee Brotherston [mailto:lee.brotherston () uk easynet net]
Sent: Friday, February 08, 2002 12:34 PM
To: 'Erlend J. Leiknes'; pen-test () securityfocus com
Subject: RE: arpspoofing



| Any other ways to sniff in a switched enviorment?

There are a couple of other ways to sniff traffic on a switched
network
assuming you have physical access to network:

- - Alot of switches these days have the option of configuring a mirror
port.
This port get's duplicates of traffics from all other ports.  So you
can see
everything.  This port does get the aggregate of the others remember,
so it
will be high bandwidth.

- - You could place a machine on the networks' uplink running in
bridging
mode.  Doing this you will only see traffic that is going over the
uplink
however, as local traffic will be sent via the switch only, and will
not
touch the uplink.  And you have the downside of causing an outage
when you
install/remove the machine.

Thanks

  Lee

- -- 
Lee Brotherston  -  IP Security Manager, Easynet Ltd
http://www.easynet.net/         Phone: +44 20 7900 4444

- ----------------------------------------------------------------------
- ------
This list is provided by the SecurityFocus Security Intelligence
Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities
please see:
https://alerts.securityfocus.com/

-----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPGgXy24N+bXOHao1EQK33ACgwz4oHWysgLbGZ1N6ffwgkf2SwA0AoKi/
hc5FQNwMGZL9JZNDZH+t2KZB
=xpat
-----END PGP SIGNATURE-----

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: