Penetration Testing mailing list archives
Re: sniffing plaintext protocols
From: Shreyas Zare <shreyasonline () yahoo com>
Date: Wed, 9 Aug 2006 12:08:00 -0700 (PDT)
Hi, --- Dotzero <dotzero () gmail com> wrote:
On 8/1/06, Shreyas Zare <shreyasonline () yahoo com> wrote:Hi, First, You are talking about active sniffing. I made the statement on passive sniffing. Second, Dont you think when you have access to the router,youare probably on the same physical network. Theexampleyou gave states that person (evil) B have accesstothe router. This clearly stated that he has accesstothe network of the victim.Not at all. It could be a router sitting in front of your network. For example, you connect to your ISP.... evil person B sniffs the router that your ISP has in front of you. You only have a single path to the outside world.
When the evil person B sniffs the ISP router, he *is* on the *same network*. When I connect to an ISP, I become part of their network. So, effectively, if you are sniffing passively, you must be on the same network or have physical access to the network (cable). For wifi, just being in the accesspoint range makes you ON the network. Shreyas Zare Co-Founder, Technitium eMail: shreyas () technitium com ..::< The Technitium Team >::.. Visit us at www.technitium.com Contact us at theteam () technitium com Technitium Personal Computers We belive in quality. Visit http://pc.technitium.com for details. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Re: sniffing plaintext protocols itsec.info (Aug 01)
- Re: sniffing plaintext protocols Dotzero (Aug 09)
- Message not available
- Re: sniffing plaintext protocols Dotzero (Aug 10)
- Re: sniffing plaintext protocols Gary E. Miller (Aug 10)
- Re: sniffing plaintext protocols Tonnerre Lombard (Aug 11)
- Re: sniffing plaintext protocols itsec.info (Aug 11)
- Re: sniffing plaintext protocols Joachim Schipper (Aug 11)
- Re: sniffing plaintext protocols Tonnerre Lombard (Aug 15)
- Re: sniffing plaintext protocols killy (Aug 18)
- Message not available
- Re: sniffing plaintext protocols Dotzero (Aug 09)
- <Possible follow-ups>
- Re: sniffing plaintext protocols Shreyas Zare (Aug 09)
- Re: sniffing plaintext protocols dfullert (Aug 10)
- Re: sniffing plaintext protocols Shreyas Zare (Aug 10)