Penetration Testing mailing list archives
Re: NGSEC's penetration test sniffer
From: Anders Thulin <Anders.Thulin () kiconsulting se>
Date: Fri, 27 Sep 2002 08:30:37 +0200
Muhammad Faisal Rauf Danka wrote:
There is another commandline sniffer available, named tethereal. http://www.ethereal.com/tethereal.1.html
tethereal is a bit more messy to use for pen-test purposes, though -- by which I mean 'insert in target systems for sniffing out passwords on their network'. In particular it needs WinPcap to be installed. And, of course, you really need to be able to uninstall WinPcap once the job is finished. Or is it just that I haven't figured out how install and uninstall WinPCap using only a command line or batch interface? From the point of the software developer, there is also the DLC interface, which I think is included in all Win32 environments and allows sending/recieving of raw Ethernet frames (or at least claims to -- I've not got it to work myself, getting all tangled up in CCBs). -- Anders Thulin anders.thulin () kiconsulting se 040-661 50 63 Ki Consulting AB, Box 85, SE-201 20 Malmö, Sweden ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- NGSEC's penetration test sniffer Fermín J . Serna (Sep 23)
- <Possible follow-ups>
- Re: NGSEC's penetration test sniffer The Blueberry (Sep 26)
- Re: NGSEC's penetration test sniffer nad (Sep 29)
- Re: NGSEC's penetration test sniffer Muhammad Faisal Rauf Danka (Sep 26)
- Re: NGSEC's penetration test sniffer Anders Thulin (Sep 29)
- Re: NGSEC's penetration test sniffer The Blueberry (Sep 30)
- Re[2]: NGSEC's penetration test sniffer nad (Sep 30)