November 12th, 2001, 03:16 AM
I know that in Windows NT there was a registry key you could turn on to enable promiscous mode for the Network Monitor...
I don't think that needed any special hardware to run, but all you could see were the transfer statistics, you couldn't actually read the data inside the individual packet...
What OS are you coding for?
\"Isn\'t sanity just a one trick pony anyway? I mean, all you get is one trick. Rational Thinking.
But when you\'re good and crazy, hehe, the skies the limit!!\"
November 12th, 2001, 04:27 AM
YOu shouldn't have a problem with it, But if you want better advice I suggest you be more specific, Curious what language ?
November 15th, 2001, 02:00 PM
I feel that if you want to develop a Sniffer before you even think about coding you will have to gain a good conceptual understanding of how the lower levels of the Systems work, and at what level you wish to intercept the traffic I.E. after the NDIS Before IP etc.
You donít need to have the NIC in promiscuous mode to sniff packets, however I would recommend getting hold of an open source analyzer and having a play. I believe there are some out there.
The next problem is what are you going to do with the packets once you have captured them, are you going to decode the protocols and so on.
What you are proposing in not a straightforward task and there are many very capable analyzers available.