lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <F509E6111989D311B63700805FA761DA0D20ADFD@DBDE01> From: motiwala at ti.com (Motiwala, Yusuf) Subject: Caching a sniffer [Resending] This is very much OS dependent solution. If you rely on some response technique, one can just disable transmission at sniffing end and you will never come to know about sniffer existence. It is very easy to do. This topic was discussed before also without any concrete solution. Yusuf > -----Original Message----- > From: full-disclosure-admin@...ts.netsys.com [mailto:full-disclosure- > admin@...ts.netsys.com] On Behalf Of Ian Latter > Sent: Thursday, March 11, 2004 10:57 AM > To: Gary E. Miller > Cc: Full Disclosure > Subject: Re: [Full-Disclosure] Caching a sniffer > > > > While there's no way to be sure-sure ... you can get into your > local LAN segment and send ICMP(/whatever) requests to the > correct L3 address with the wrong L2 address and see if you > get a response; this will show you if hosts/devices are listening > promiscuously (which makes for a good starting point). > >
Powered by blists - more mailing lists