Page 2 of 2 FirstFirst 12
Results 11 to 20 of 20

Thread: MAC spoofing and packet sniffing?

  1. #11
    Senior Member IKnowNot's Avatar
    Join Date
    Jan 2003
    Posts
    792
    Uh, Tiger Shark and d0pp kind of summed it up.

    I will say it a little less diplomatic:
    If you can't handle Windows, use your computer as a door stop, you will get more use out of it.

    Yes, M$ has problems. Most can be mitigated by proper administration.

    And there in lies the quandary: How do you learn to administer an OS without understanding what it is doing, especially since M$ tries to do it for you without doing it properly from the start?

    READ!
    Everything you can.
    M$ actually helps you. They provide a wealth of knowledgebase articles to study.

    “ Google” for answers.

    Come here to AO and search through the archives, ask questions if you can't find an answer.

    Am I saying that Linux isn't a great OS? ........ No.

    Am I saying you can't learn from Linux? .......... No.

    What I am saying is that if you can't secure a M$ system, then installing Linux and expecting it to secure itself is futile at best.

    Linux, at least in the early days, made you learn how to secure it, and run it for that matter.
    Now pretty much anybody with a little computer savvy can install and run Linux. Just because fewer exploits are written for Linux at this time doesn't mean you are safe if you run it. That will change, before you know it.

    And as d0pp said, M$ is the industry standard. If you expect a job somewhere, you better know M$. But if you want to learn something else, Linux can still be a great teacher.

    Go to Linux for the right reasons.

    MOOD: Drunk and Content. Just finished a GREAT Dominican, just got through teaching ( while learning and getting drunk together ) an old Linux guru and friend how to administer LVM on Linux, all while listening to a great CD, Big Band Christmas ( the Peter Jacobs Orchestra )
    Life is Good, despite the curves it throughs.
    " And maddest of all, to see life as it is and not as it should be" --Miguel Cervantes

  2. #12
    Member
    Join Date
    May 2002
    Posts
    62
    Whoa. This topic has gone errr off-topic. For the record there are ways to "sniff" traffic going on on a router or switch. I've read about ARP poisioning which you could use to monitor traffic going on between specific computers or to the router. That way wouldn't be really realistic because of the hardware resources required. Another option is to use a proxy server on your network for all of your workstations.

    On the side topic: I got the current job I have right now because I knew Linux.

    Hope I kind of helped.

    rasem

  3. #13
    AO Ancient: Team Leader
    Join Date
    Oct 2002
    Posts
    5,197
    Rasem:

    Keep reading.... Maybe you'll learn something in your browsings.... 'Cos you don't seem to understand the principle you are talking about right now....

    What hardware requirements do you need to ARP spoof?
    Don\'t SYN us.... We\'ll SYN you.....
    \"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides

  4. #14
    Member
    Join Date
    May 2002
    Posts
    62
    Tiger Shark,

    I would like to start by conceding to your superior skills.

    I went back and re-read the section on MAC-address spoofing as you suggested. Would it be accurate to say that you could have multiple interceptions occurring through the same machine at the same time using a single NIC?

    I'd appreciate your clarification.

    rasem

  5. #15
    Banned
    Join Date
    Jun 2005
    Posts
    445
    Yes, that is what promiscuous mode means.


    It accepts every packet it sees, not just those packets bound for whatever IP the NIC has.


    The key is making every packet come to the NIC. That is where either a hub, or an ARP attack comes into play.

    The hub will not direct packets to the correct NIC, every NIC sees every packet. And the ARP poisoning will convince the other machines that your computer is a gateway of sorts.

  6. #16
    Member
    Join Date
    May 2002
    Posts
    62
    Gee - lots of posts, but I want to make sure that I'm fully understanding your answer, d0pp. I understand that that mode will accept all packets, however in the scenario we're doing this with a switch or router, so even if it is in promiscuous, it won't receive those packets unless it is actively either legitimately receiving packets or intercepting, by receiving the packets intended for another machine and then forwarding to the true target. The reason obviously being because the information is not being broadcast to all ports. What I am questioning is if you can actively receive intercepted packets by ARP poisoning from multiple machines. Writing it out, from my limited understanding, it seems plausible, but initially I had hastily assumed you'd required multiple NICs. If that is the case, I apologize.

    rasem

  7. #17
    AO Ancient: Team Leader
    Join Date
    Oct 2002
    Posts
    5,197
    If you are trying to capture packets from a whole switched network rather than an individual machine a better attack to try is an ARP flood. When you ARP flood a switch, (send packets claiming to be from multiple hosts that already exist out on the local network), you will either fill the switches ARP tables up or confuse the switch by having so many multiple entries that the switch will fail over to being a hub which broadcasts all packets on all ports.

    ARP spoofing, by it's name, is better suited to use against an individual host.
    Don\'t SYN us.... We\'ll SYN you.....
    \"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides

  8. #18
    Senior Member
    Join Date
    Oct 2001
    Posts
    131
    A good site to check out on sniffing connections is www.remote-exploit.org they have a bootable cd you can even use. The video tutorials are a bit dull but will explain things in an easy way.

    Check google for "Man in the middle" attacks, Although I use the term "Attack" this is another great way to check if any info is being sent from a computer, You will need two nic cards or at least two network connections (wired,wireless).
    Whats a \"START\" button?

  9. #19
    Senior Member
    Join Date
    Jul 2004
    Posts
    469
    As the original topic requested, if you want to sniff a wireless network what you're more concerned with is having a WiFi card and driver that supports RFMon mode. This means that the actual card received all signals instead of those intended for it. The promiscuous mode only deals with the packets once they get to the OS.

  10. #20
    AntiOnline Senior Medicine Man
    Join Date
    Nov 2001
    Posts
    724
    Well, I'm not 100% certain about this wireless setup you have, but i know that if you plug a switch into your router, then plug all your hosts into that, you can spoof yourself as the gateway, and the all traffic will route through you, kinda like man in the middle attack. But really i dont know much else other than.
    It is better to be HATED for who you are, than LOVED for who you are NOT.

    THC/IP Version 4.2

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •