lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <200403110754.i2B7sPC10289@singularity.tronunltd.com> From: Ian.Latter at mq.edu.au (Ian Latter) Subject: Caching a sniffer > > While there's no way to be sure-sure ... you can get into your > > local LAN segment and send ICMP(/whatever) requests to the > > correct L3 address with the wrong L2 address and see if you > > get a response; this will show you if hosts/devices are listening > > promiscuously (which makes for a good starting point). > > Not necessarily? > > I thought that depended on the ip stack implementation. Not sure what you're driving at .. do you mean you can't use the same test on all stack implementations or that this test just won't work on all stack implementations? One of the links sent through before had a link to a good read on the variations of the theme required for three specific implementations. From Tim's message you get this link; http://seclists.org/lists/focus-ids/2004/Feb/0028.html In turn, gives you this link; http://www.securiteam.com/tools/AntiSniff_- _find_sniffers_on_your_local_network.html [wr-wr-wrapped] There they discuss NetBSD, Linux and Windows detection. The assumption that I'm skirting around is that the sniffer is on an existing host (pc/server/etc) .. and as such its not well prepared for the task; ie - that it is capable of being actively probed (that it will respond). I think the original post / first response included a reference to a site being physically accessed ... I guess that's when good physical access controls/records/etc become valuable. As I said, its a good starting point (better than looking at a wiring closet and your watch, and working out the latest time you can order pizza). -- Ian Latter Internet and Networking Security Officer Macquarie University
Powered by blists - more mailing lists