Penetration Testing mailing list archives

RE: Sniffers, scanners and XP raw packet drivers


From: "Shackleford, Dave" <znz1 () cdc gov>
Date: Thu, 13 Dec 2001 13:03:21 -0500

If I'm not mistaken, XP Pro has a "pool" of DLLs and drivers available to it
that may allow you to run apps in a "Pre-XP OS" mode; for example, I know
you can run apps in a simulated Win98 or simulated Win 2K environment. I
can't remember exactly how, though - try the always-helpful right-click on
the app executable and see what happens....

Dave Shackleford
Web Content Management Team (TRW)
CDC - NCCDPHP
--------------------------
770-488-5816
znz1 () cdc gov


-----Original Message-----
From: Simon [mailto:simon () derision net]
Sent: Thursday, December 13, 2001 7:51 AM
To: PenTest
Subject: Sniffers, scanners and XP raw packet drivers


Folks,

Anyone had any success getting Ethereal and other tools to work under
Windows XP Pro?
even if Winpcap installed:

  Ethereal won't find an interface, 
  ISS can't find raw packet drivers for some of its scans are disabled
  Nmapnt can't find any suitable interfaces
  Foundstone fport won't resolve ports to process owners (although fscan
and superscan run fine)
  .... (the list goes on)

All these worked on my laptop nicely under Windows 2000? Does anyone
have a solution to this? I guess what I need is a raw packet capture
driver that works under winXP... Any ideas?

Aaarrrgggh,

Simon, CISSP



----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/

----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: