Penetration Testing mailing list archives
RE: Port Listening
From: "Luke Walsh" <wasabig () ii net>
Date: Thu, 10 Aug 2006 23:53:32 +0800
My first post so sorry if I've replied wrong. -- Try enabling port mirroring on your switch, plug in your laptop to the mirrored port, run a sniffer such as ethereal and tell it to report all traffic for the port number and IP you are interested in. //Luke Hi Pals, What tools can enable me listen to all traffics destined to a particular port on my database server for the purpose of monitoring changes to my database tables. My database server is on a different VLAN from my PC. Cheers, Chris. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around http://mail.yahoo.com ---------------------------------------------------------------------------- -- This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ---------------------------------------------------------------------------- -- ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details. ------------------------------------------------------------------------------
Current thread:
- Re: Vulnerability Assessment vs. PenTest, (continued)
- Re: Vulnerability Assessment vs. PenTest xelerated (Aug 07)
- Re: Vulnerability Assessment vs. PenTest Magdelin Tey (Aug 07)
- RE: Vulnerability Assessment vs. PenTest StyleWar (Aug 08)
- RE: Vulnerability Assessment vs. PenTest Bob Radvanovsky (Aug 06)
- RE: Vulnerability Assessment vs. PenTest Omar A. Herrera (Aug 07)
- Re: Vulnerability Assessment vs. PenTest Gray Ghost (Aug 07)
- RE: Vulnerability Assessment vs. PenTest Craig Wright (Aug 09)
- RE: Vulnerability Assessment vs. PenTest David M. Zendzian (Aug 09)
- RE: Vulnerability Assessment vs. PenTest Craig Wright (Aug 09)
- Port Listening Chris Esezobor (Aug 10)
- RE: Port Listening Luke Walsh (Aug 10)
- Port Listening Chris Esezobor (Aug 10)
- Re: Vulnerability Assessment vs. PenTest harshal . mehta (Aug 10)
- Re: Vulnerability Assessment vs. PenTest lakshminarayanan79 (Aug 21)
- Re: Vulnerability Assessment vs. PenTest Marco Ivaldi (Aug 28)