|
|
nanotech
from Sukavasti Amitaba Pureland (United States) on 2003-11-29 18:42 [#00970745]
Points: 3727 Status: Regular
|
|
How can i tell when someone's put a sniffer on my traffic? Are there any hacker sites anyone could sugest where i can read more about the mechanics of a sniffer?
|
|
Aphexisatwin
from your mom's room (United States) on 2003-11-29 18:43 [#00970748]
Points: 2777 Status: Regular
|
|
::sniffs his crotch:: I'm sorry, but someone has to do it
|
|
nlogax
from oh, you must be the brains (Norway) on 2003-11-29 18:44 [#00970750]
Points: 4653 Status: Regular
|
|
'ere, do a search on sniffing.
|
|
Jedi Chris
on 2003-11-29 18:45 [#00970753]
Points: 11496 Status: Lurker | Followup to nanotech: #00970745
|
|
http://www.etherdetect.com/demo.htm
Cool demo
|
|
nlogax
from oh, you must be the brains (Norway) on 2003-11-29 18:49 [#00970762]
Points: 4653 Status: Regular | Followup to Jedi Chris: #00970753
|
|
that might come in handy some day
|
|
Dozier
from United States on 2003-11-29 22:34 [#00971022]
Points: 2080 Status: Lurker | Followup to nanotech: #00970745
|
|
great movie, if indeed the subject line is a play on a movie quote...
or maybe i'm just stupid.
|
|
nanotech
from Sukavasti Amitaba Pureland (United States) on 2003-11-29 23:15 [#00971036]
Points: 3727 Status: Regular | Followup to Dozier: #00971022
|
|
ravenous? yeah, i had to make it catchy 'cuz most of my other "technical" topics go dwn the drain with hardly any answers, and with me rambling on, and on for the bump.
|
|
xf
from Australia on 2003-11-29 23:18 [#00971038]
Points: 2952 Status: Lurker
|
|
real sniffers are completely passive.
meaning there's no way in the fucking world you can tell if you're being sniffed or not.
|
|
elusive
from detroit (United States) on 2003-11-29 23:43 [#00971044]
Points: 18368 Status: Lurker | Show recordbag
|
|
WTF ARE YOU FUCKING SERIOS
dood no one can just SNIFF YER TRAFFIC
if so they have to have ACCESS TO THE ROOT VLAN UPLINK TO THE ROUTER.
this means
they will only see your broadcasts (unless on a hub-type segment)
or they have at the vLAN uplink to the router MIRRORED (span port) and they are sniffing that port
THIS MEANS
THAT THEY WOULD HAVE TO HAVE DIRECT PHYSICAL ACCESS TO THE ISP' SWITCHE AND ROUTERS
I DONT THINK SO BUDDY.
STOP FREAKING OUT
EJEEZOUS
|
|
elusive
from detroit (United States) on 2003-11-29 23:44 [#00971046]
Points: 18368 Status: Lurker | Show recordbag
|
|
and if they are not on the same segment as you, then of COURSE ....... htis isn't going to happen.
CHILL
|
|
princo
from Shitty City (Geelong) (Australia) on 2003-11-29 23:59 [#00971052]
Points: 13411 Status: Lurker
|
|
Pantysniffer? Rad!
|
|
nanotech
from Sukavasti Amitaba Pureland (United States) on 2003-11-30 00:02 [#00971053]
Points: 3727 Status: Regular | Followup to elusive: #00971044
|
|
actually, these people can very well do this.
|
|
elusive
from detroit (United States) on 2003-11-30 04:25 [#00971138]
Points: 18368 Status: Lurker | Show recordbag
|
|
it is much more difficult than you may think ;)
|
|
nanotech
from Sukavasti Amitaba Pureland (United States) on 2003-11-30 04:45 [#00971143]
Points: 3727 Status: Regular | Followup to elusive: #00971138
|
|
not when i live in a military installation where they've told us that they can do this. (maybe a scare tactic, but the comany that's contracted to give the base its internet service kicks us off after 24 hrs us use [yes, dls line]. It's a security issue) Since they can do this, i'm sure that the investagators can sniff me. They've told me personally (since i work on the bases's military networks), that they can sniff anyoen on base if need be.
|
|
xf
from Australia on 2003-11-30 06:03 [#00971184]
Points: 2952 Status: Lurker
|
|
elusive: whu, vlan uplink traffic mirrored?
dood, hack teh gibson! damn blakhat hakers, wtf11?!??
nano: given whoever said that has access to any network segments between you and your destination (routers, network cabling, etc), they can certainly sniff you. of course, if the data from you->destination is encrypted, it's not going to be terribly useful ;-)
|
|
Jedi Chris
on 2003-11-30 06:07 [#00971185]
Points: 11496 Status: Lurker | Followup to nanotech: #00971143
|
|
Maybe its time to change your deoderant if they can still sniff you!
;)
|
|
nanotech
from Sukavasti Amitaba Pureland (United States) on 2003-11-30 06:11 [#00971187]
Points: 3727 Status: Regular | Followup to xf: #00971184
|
|
any sugestions on propper encryption proggs?
|
|
xf
from Australia on 2003-11-30 06:15 [#00971189]
Points: 2952 Status: Lurker
|
|
remote end needs to understand the encryption too, so unfortunately it's not as easy as just downloading some program that'll do it all for you.
typically, you look at encrypting the services you use, and make sure the remote end you're talking to supports the encryption. use the web? use https:// (ssl) sites with important stuff; you should be doing this already without even knowing it (credit cards, etc).
email? make sure you're using secure pop3 (ssl) or ssl-imap instead of normal pop3/imap, which sends passwords/emails over in plain text. of course, your email server needs to support it.
instead of using ftp, use an alternative such as sftp (secure ftp, ssh-style).
instead of using telnet, use ssh.
list goes on; the remote end needs to talk the same encryption as you're sending to it, though.
|
|
xf
from Australia on 2003-11-30 06:16 [#00971191]
Points: 2952 Status: Lurker | Followup to Jedi Chris: #00971185
|
|
... or start using deoderant
lolzroflwtf11!!
|
|
Jedi Chris
on 2003-11-30 06:17 [#00971192]
Points: 11496 Status: Lurker | Followup to xf: #00971191
|
|
Hahahah
|
|
nanotech
from Sukavasti Amitaba Pureland (United States) on 2003-11-30 06:19 [#00971193]
Points: 3727 Status: Regular | Followup to xf: #00971189
|
|
ssh, huh? never heard of dat one. What about sftp? Do ftp servers need to be configured to suport sftp? is is that a protocol that most tend to do as it is?
|
|
nanotech
from Sukavasti Amitaba Pureland (United States) on 2003-11-30 06:20 [#00971194]
Points: 3727 Status: Regular | Followup to xf: #00971191
|
|
Could you explain what is "smelt" :P via sniffing? I'd greatly like to read up on the mechanics.
|
|
xf
from Australia on 2003-11-30 06:29 [#00971197]
Points: 2952 Status: Lurker
|
|
Yeah, most ftp servers won't support sftp, usually you need to reimplement the server side of things.
If you've never heard of ssh, then you probably don't need to know about it :-)
It all depends on how paranoid you are; you probably don't need to encrypt *everything*.
Smelt? No idea.
|
|
elusive
from detroit (United States) on 2003-11-30 06:30 [#00971198]
Points: 18368 Status: Lurker | Show recordbag
|
|
nanotech, you say "actually, these people can very well do this. "
well you neglectced earlire in your post to say that YOU ARE ON A MILITARY BASE, where all traffic SHOULD have an eye kept on it (sorry, but true..)
and also that it's on the same segment.
it's not goign to be hard, there are PLENTY of great packet decoders out there these days,
|
|
xf
from Australia on 2003-11-30 06:30 [#00971199]
Points: 2952 Status: Lurker | Followup to xf: #00971197
|
|
actually, you'd be better off asking Jedi Chris about 'smelt' :P
|
|
elusive
from detroit (United States) on 2003-11-30 06:32 [#00971200]
Points: 18368 Status: Lurker | Show recordbag
|
|
and yes XF, if it's a switchd network you will not be able to "sniff" the traffic - you will only see broadcasts and all uni-traffic must be captured from the router uplink. it is the only other point will traffic will go through.
there are "other" ways, but they require some expensive equiment (cough, in my lab, cough).
|
|
xf
from Australia on 2003-11-30 07:04 [#00971230]
Points: 2952 Status: Lurker
|
|
arp spoofing, etc?
yeah, it's not as easy as some think, but that said, it's not impossible either, especially given if you're on the same network segment (switch or not, although hubs make things stupidly easy).
|
|
elusive
from detroit (United States) on 2003-11-30 07:18 [#00971245]
Points: 18368 Status: Lurker | Show recordbag
|
|
arp spoofing will confuse the switch/router/hub.
Switches (unless in a sort of SPAN mode) will not actively forward frames to 2 ports with the same MAC address unless specifically configured (like a multi-trunk/multiple access server).
The MAC table will continously be updated (MAC aging timers will be relenquished) and frames will get forwarded to each port, depending on the update of the FDB of the switch,
i dunno, there's ways, but they are unlikely.
|
|
Messageboard index
|