Penetration Testing mailing list archives
Using a Compromised Router to Capture Network Traffic
From: Penetration Testing <pentest () infosecure com au>
Date: Mon, 15 Jul 2002 10:43:49 -0800 (GMT+8)
Hi all. I have recently completed some experimentation into using a captured router to sniff network traffic on a remote network. This is in the same vein as Gauis' article in Phrack 56 (Things to do in cisco land when you are dead). I have tried to build on Gauis' work in that I terminated the GRE tunnel on a Cisco router instead of a *nix machine. I explored a couple of possible scenarios for this, the net result being that it is possible to remotely capture (bi-directional) network traffic using NO customised tools; all that is required is one cisco router with vanilla IOS, and a machine that can run snoop or tcpdump. Anyway, if anyone is interested, the document describing the experiment and results is available at http://www.geocities.com/david_taylor_au/ (Word 2000 format). Or, contact me. Regards, Dave Taylor ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- Using a Compromised Router to Capture Network Traffic Penetration Testing (Jul 15)
- Re: Using a Compromised Router to Capture Network Traffic Fabio Pietrosanti (naif) (Jul 16)
- <Possible follow-ups>
- RE: Using a Compromised Router to Capture Network Traffic Moffett, Ryan (Jul 15)
- RE: Using a Compromised Router to Capture Network Traffic Axel Dunkel (Jul 15)
- RE: Using a Compromised Router to Capture Network Traffic Jeremy Junginger (Jul 15)
- RE: Using a Compromised Router to Capture Network Traffic Jeremy Junginger (Jul 15)