lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040311135334.7801.qmail@compuitaly.it> From: eflorio at edmaster.it (eflorio@...aster.it) Subject: Caching a sniffer Try this..... http://www.securityfriday.com/ToolDownload/PromiScan/promiscan_doc.html It tries to detect promisc. mode interface on your LAN using special ARP packets. Anyway you must detect if attacker is using : - promiscuous mode simple packet sniffer - arp poisoning \"man-in-the-middle\" sniffing (look at ettercap....) EF >----- Original Message ----- >From: \"David Vincent\" <david.vincent@...htyoaks.com> >To: <full-disclosure@...ts.netsys.com> >Sent: Thursday, March 11, 2004 6:51 AM >Subject: RE: [Full-Disclosure] Caching a sniffer > > How can i know if there a sniffer running in my network?
Powered by blists - more mailing lists