Security Basics mailing list archives
RE: Caching a sniffer
From: "Shawn Jackson" <sjackson () horizonusa com>
Date: Thu, 25 Mar 2004 09:01:41 -0800
Agreed, switches can be made to give up secrets, however, as I have sub
sequentially
pointed out if ARP/CAM table poisoning is used switches will report
moving mac address
problems to their management tools and hence you will be able to
determine where the
sniffer is plugged.
Using Cisco's management and analysis suite that I know. But in my case here we have a large rail-frame HP Procurve switch, very nice unit but none of the functionality you mentioned. Same with other vendors like SMC, Dell, etc.
A simple syslog monitoring tool will give you this information.
Know of any off the top-of-your-head? I currently have a syslog server setup, but I usually have to make my own shell scripts to get the information I need.
Any medium to large organization should be using manageable network
devices
(rather than the cheap un-managed small type) and all of these (to my
knowledge)
support at least syslog free out of the box. A simple Linux server will
then collect
any data, and every company has an old PC they can acquire for this
purpose. Well, I hope anyone other then SOHO would not be using Netgear, Linksys, etc in their network, that has to get against some kind of standard somewhere. But companies like SMC (TigerSwitch Platform) are Small-Med biz placed, manageable, gear. Now that might have changed that they do support remote syslogging but last time I looked at their line, it was absent. The setting up of a Linux box requires some clue, but I would think it would be in the realm of any sysmin. Some call me a dreamer, maybe they're right :-). This has been a good topic, I hope other members of the list were able to learn something. Shawn Jackson Systems Administrator Horizon USA 1190 Trademark Dr #107 Reno NV 89521 www.horizonusa.com Email: sjackson () horizonusa com Phone: (775) 858-2338 (800) 325-1199 x338 --------------------------------------------------------------------------- Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off any course! All of our class sizes are guaranteed to be 10 students or less to facilitate one-on-one interaction with one of our expert instructors. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. Visit us at: http://www.infosecinstitute.com/courses/ethical_hacking_training.html ----------------------------------------------------------------------------
Current thread:
- RE: Caching a sniffer, (continued)
- RE: Caching a sniffer David Gillett (Mar 25)
- RE: Caching a sniffer Shawn Jackson (Mar 25)
- RE: Caching a sniffer David Gillett (Mar 25)
- RE: Caching a sniffer Shawn Jackson (Mar 25)
- RE: Caching a sniffer Andrew Shore (Mar 25)
- RE: Caching a sniffer Paul Blackstone (Mar 25)
- RE: Caching a sniffer Byron Copeland (Mar 26)
- Re: Caching a sniffer Aaron (Mar 29)
- RE: Caching a sniffer Paul Blackstone (Mar 25)
- RE: Caching a sniffer David Gillett (Mar 25)
- RE: Caching a sniffer Andrew Shore (Mar 25)
- RE: Caching a sniffer Shawn Jackson (Mar 25)
- RE: Caching a sniffer Shawn Jackson (Mar 25)
- RE: Caching a sniffer David Gillett (Mar 26)
- RE: Caching a sniffer Shawn Jackson (Mar 25)
- RE: Caching a sniffer David Gillett (Mar 25)
- RE: Caching a sniffer Shawn Jackson (Mar 25)
- RE: Caching a sniffer Andrew Shore (Mar 25)
- RE: Caching a sniffer Shawn Jackson (Mar 25)
- RE: Caching a sniffer David Gillett (Mar 26)
- RE: Caching a sniffer Shawn Jackson (Mar 26)
- RE: Caching a sniffer Shawn Jackson (Mar 26)