Penetration Testing mailing list archives

Re: sniffing plaintext protocols


From: Shreyas Zare <shreyasonline () yahoo com>
Date: Wed, 9 Aug 2006 12:08:00 -0700 (PDT)

Hi,

--- Dotzero <dotzero () gmail com> wrote:

On 8/1/06, Shreyas Zare <shreyasonline () yahoo com>
wrote:
Hi,

First,
You are talking about active sniffing. I made the
statement on passive sniffing.

Second,
Dont you think when you have access to the router,
you
are probably on the same physical network. The
example
you gave states that person (evil) B have access
to
the router. This clearly stated that he has access
to
the network of the victim.


Not at all. It could be a router sitting in front of
your network. For
example, you connect to your ISP.... evil person B
sniffs the router
that your ISP has in front of you. You only have a
single path to the
outside world.


When the evil person B sniffs the ISP router, he *is*
on the *same network*. When I connect to an ISP, I
become part of their network. So, effectively, if you
are sniffing passively, you must be on the same
network or have physical access to the network
(cable). For wifi, just being in the accesspoint range
makes you ON the network.




Shreyas Zare
Co-Founder, Technitium

eMail: shreyas () technitium com

..::< The Technitium Team >::..
Visit us at www.technitium.com
Contact us at theteam () technitium com


Technitium Personal Computers
We belive in quality.
Visit http://pc.technitium.com for details.







__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: