Page 2 of 2 FirstFirst 12
Results 11 to 13 of 13

Thread: promiscuous mode

  1. #11
    Senior Member
    Join Date
    Sep 2001
    Posts
    831
    I know that in Windows NT there was a registry key you could turn on to enable promiscous mode for the Network Monitor...
    I don't think that needed any special hardware to run, but all you could see were the transfer statistics, you couldn't actually read the data inside the individual packet...

    What OS are you coding for?
    -Matty_Cross
    \"Isn\'t sanity just a one trick pony anyway? I mean, all you get is one trick. Rational Thinking.
    But when you\'re good and crazy, hehe, the skies the limit!!\"

  2. #12
    YOu shouldn't have a problem with it, But if you want better advice I suggest you be more specific, Curious what language ?

  3. #13
    Junior Member
    Join Date
    Jul 2001
    Posts
    12
    I feel that if you want to develop a Sniffer before you even think about coding you will have to gain a good conceptual understanding of how the lower levels of the Systems work, and at what level you wish to intercept the traffic I.E. after the NDIS Before IP etc.

    You don’t need to have the NIC in promiscuous mode to sniff packets, however I would recommend getting hold of an open source analyzer and having a play. I believe there are some out there.

    The next problem is what are you going to do with the packets once you have captured them, are you going to decode the protocols and so on.

    What you are proposing in not a straightforward task and there are many very capable analyzers available.

    Regards,



    Steve.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •