


© copyright 2002 by Marc Barrot.
|
|
|
 |
|
Thursday, March 7, 2002 |
Network sniffers are always bad news
SwitchSniff. For those who think switched Ethernet environments are sniff-proof, the author offers this warning. [Linux Journal]
Got to remember to check the switches settings and documentation next time I'm around a server room. Come to think of it, in manageable switches, SNMP communities might be a little too talkative.
Checking hosts for network interfaces in promiscuous mode on a regular basis, with a tool like ifpromisc from the chkrootkit suite may not be a bad idea as well (ifconfig might be compromised already - or is this paranoia ?).
4:05:11 PM
|
|
|
|
March 2002 |
Sun |
Mon |
Tue |
Wed |
Thu |
Fri |
Sat |
|
|
|
|
|
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
9 |
10 |
11 |
12 |
13 |
14 |
15 |
16 |
17 |
18 |
19 |
20 |
21 |
22 |
23 |
24 |
25 |
26 |
27 |
28 |
29 |
30 |
31 |
|
|
|
|
|
|
Feb Apr |
last updated: 10/21/02; 12:45:04 AM.
Currently subscribed to: Here's how this works.
|