Penetration Testing mailing list archives

Re: [PEN-TEST] Datacenter Wiring


From: Frank Knobbe <FKnobbe () KNOBBEITS COM>
Date: Fri, 20 Oct 2000 15:36:25 -0500

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I think I should have stated more clearly that using this cable (with
its loopback on the LAN side) can coax some switches into behaving
like a hub, displaying all traffic...

Frank

-----Original Message-----
From: Frank Knobbe
Sent: Friday, October 20, 2000 1:42 PM

I've been using a 'special' (well, self crimped) cable that snoops,
but does not leak. I've come across one network where it didn't
work (probably hub/switch type issue), but worked every else (I
haven't tested that many sites, though). Here is my pinout:

LAN       Sniffer
1 -----\    /-- 1
2 ---\ |    \-- 2
3 ---+-*------- 3
4 -  |        - 4
5 -  |        - 5
6 ---*--------  6
7 -           - 7
8 -           - 8

Basically, 1 and 2 on the sniffer side are connected, 3 and 6
straight through to the LAN. 1 and 2 on the LAN side connect to 3
and 6 respectively. This fakes a link on both ends but only allows
traffic from the LAN to the sniffer. My NIC is a 3Com 10/100
PCCard, your mileage may vary.

There might be a problem with feedback on certain hubs/switches,
but most should recognize their own MAC address and discard the
packets.

Regards,
Frank

-----BEGIN PGP SIGNATURE-----
Version: PGP Personal Privacy 6.5.1
Comment: PGP or S/MIME encrypted email preferred.

iQA/AwUBOfCsyURKym0LjhFcEQKwdACgyBsymHtzIbHNnVYYwVWZ1H3GEyEAn37i
UhNfwtSruPmxYBqZcKgtf/19
=23jh
-----END PGP SIGNATURE-----


Current thread: