Penetration Testing mailing list archives
Re: [PEN-TEST] Deploying a Win32 Sniffer
From: MadHat <madhat () UNSPECIFIC COM>
Date: Wed, 29 Nov 2000 10:57:50 -0600
At 04:36 PM 11/28/2000 -0500, you wrote:
I have heard several people say that once you compromise a minor target you might want to install a packet sniffer to pickup IDs and passwords on the wire. The sniffers I have used (for example, DSniff for Win32) require a packet driver to be installed on the system and it be rebooted. Is there some way to sniff IDs/Passwords without that type of packet driver?
buttsniffer (http://packetstorm.securify.com/sniffers/buttsniffer) is the only one I know of that is out. And can cause problems like crashing the machine. I have only played with it a little, so YMMV... Foundstone says they have one called fsniff that will work, but they haven't released it as of yet... MadHat at unspecific.com
Current thread:
- [PEN-TEST] Deploying a Win32 Sniffer Parth Galen (Nov 29)
- Re: [PEN-TEST] Deploying a Win32 Sniffer MadHat (Nov 30)
- <Possible follow-ups>
- Re: [PEN-TEST] Deploying a Win32 Sniffer Harrington, Chris (Nov 30)