Re: sniffer/promisc detector

2004-01-23 Thread Andrew Simmons
Ruben van der Leij wrote: +++ Alexei Roudnev [22/01/04 09:05 -0800]: My results vary from 15 minuts to 1 hour. Mine too. So nmap sucks if you want to quickly identify daemons running on strange ports. No big deal. This discussion wasn't about nmap to start with. Point of interest: Dan Kamin

Re: sniffer/promisc detector

2004-01-23 Thread Michael . Dillon
>Mine too. So nmap sucks if you want to quickly identify daemons running on >strange ports. No big deal. This discussion wasn't about nmap to start with. >The point of the discussion was wether it made sense to run services on >non-standard ports to deter cr4x0rs. And I feel it doesn't. Actuall

Re: sniffer/promisc detector

2004-01-22 Thread Alexei Roudnev
> > > My results vary from 15 minuts to 1 hour. > > Mine too. So nmap sucks if you want to quickly identify daemons running on > strange ports. No big deal. This discussion wasn't about nmap to start with. > The point of the discussion was wether it made sense to run services on > non-standard por

Re: sniffer/promisc detector

2004-01-22 Thread Ruben van der Leij
+++ Jason Slagle [22/01/04 19:13 -0500]: > > The point of the discussion was wether it made sense to run services on > > non-standard ports to deter cr4x0rs. And I feel it doesn't. > I've sat here and watched this discussion and kept my thoughts to myself > because I'm thinking "Maybe I'm missin

Re: sniffer/promisc detector

2004-01-22 Thread Jason Slagle
> Mine too. So nmap sucks if you want to quickly identify daemons running on > strange ports. No big deal. This discussion wasn't about nmap to start with. > The point of the discussion was wether it made sense to run services on > non-standard ports to deter cr4x0rs. And I feel it doesn't. I've

Re: sniffer/promisc detector

2004-01-22 Thread Ruben van der Leij
+++ Alexei Roudnev [22/01/04 09:05 -0800]: > My results vary from 15 minuts to 1 hour. Mine too. So nmap sucks if you want to quickly identify daemons running on strange ports. No big deal. This discussion wasn't about nmap to start with. The point of the discussion was wether it made sense to r

Re: sniffer/promisc detector

2004-01-22 Thread Alexei Roudnev
My results vary from 15 minuts to 1 hour.

Re: sniffer/promisc detector

2004-01-22 Thread Alexei Roudnev
n der Leij" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Thursday, January 22, 2004 1:12 AM Subject: Re: sniffer/promisc detector > > On Wed, Jan 21, 2004 at 09:04:40AM -0800, Alexei Roudnev wrote: > > > > Please, do it: > > > > time nmap -p 0-65535

Re: sniffer/promisc detector

2004-01-22 Thread Fyodor
On Wed, Jan 21, 2004 at 09:04:40AM -0800, Alexei Roudnev wrote: > > Please, do it: > > time nmap -p 0-65535 $target > > You will be surprised (and nmap will not report applications; to test a > response, multiply time at 5 ). And you will have approx. 40% of packets > lost. > > Practically, nm

Re: sniffer/promisc detector

2004-01-22 Thread Alexei Roudnev
> > Yes. But making a bomber "stealth" means designing it to be difficult > to detect by an opponent. It doesn't mean painting "I am Not a > Bomber, I Am The Ice Cream Man" on the side and hoping nobody takes a > second glance at it. This works as well. 6 years ago we set up faked telnet service

Re: sniffer/promisc detector

2004-01-22 Thread Alexei Roudnev
Roudnev" <[EMAIL PROTECTED]> Cc: "Ruben van der Leij" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Wednesday, January 21, 2004 11:26 AM Subject: Re: sniffer/promisc detector > Alexei Roudnev wrote: > > > > Please, do it: > > > >

Re: sniffer/promisc detector

2004-01-21 Thread Ruben van der Leij
+++ [EMAIL PROTECTED] [21/01/04 11:40 -0500]: > > Somebody who isn't smart enough to do 'nmap -p 0-65535 $target' isn't worth > > diverting. > I'm sure everybody who got whacked by Lion or CodeRed or Blaster or are > glad to hear those attacks weren't worth diverting. I'm sure moving www.mi

Re: sniffer/promisc detector

2004-01-21 Thread Dave Israel
Clipped for brevity... On 1/21/2004 at 10:52:00 +, [EMAIL PROTECTED] said: > > >> > Uhm, that would be wrong. This is simply "security through > obscurity". > >> Yes, it is wrong for the _smart books_. But it works in real life. > > >Actually, an automated script or manual scan can find

Re: sniffer/promisc detector

2004-01-21 Thread Crist Clark
Alexei Roudnev wrote: > > Please, do it: > > time nmap -p 0-65535 $target > > You will be surprised (and nmap will not report applications; to test a > response, multiply time at 5 ). Yes. It will, http://www.insecure.org/nmap/versionscan.html -- Crist J. Clark

Re: sniffer/promisc detector

2004-01-21 Thread Alexei Roudnev
Please, do it: time nmap -p 0-65535 $target You will be surprised (and nmap will not report applications; to test a response, multiply time at 5 ). And you will have approx. 40% of packets lost. Practically, nmap is useless for this purpose. > > Somebody who isn't smart enough to do 'nmap -p 0

Re: sniffer/promisc detector

2004-01-21 Thread Valdis . Kletnieks
On Wed, 21 Jan 2004 15:58:14 +0100, Ruben van der Leij <[EMAIL PROTECTED]> said: > Somebody who isn't smart enough to do 'nmap -p 0-65535 $target' isn't worth > diverting. I'm sure everybody who got whacked by Lion or CodeRed or Blaster or are glad to hear those attacks weren't worth diverti

Re: sniffer/promisc detector

2004-01-21 Thread Ruben van der Leij
+++ [EMAIL PROTECTED] [21/01/04 10:52 +]: > >> > Uhm, that would be wrong. This is simply "security through > >> > obscurity". > >> Yes, it is wrong for the _smart books_. But it works in real life. > >Actually, an automated script or manual scan can find it trivially. > If security throu

Re: sniffer/promisc detector

2004-01-21 Thread Michael . Dillon
>> > Uhm, that would be wrong. This is simply "security through obscurity". >> Yes, it is wrong for the _smart books_. But it works in real life. >Actually, an automated script or manual scan can find it trivially. If security through obscurity was useless then the USAF would never have devel

Re: sniffer/promisc detector

2004-01-21 Thread Alexei Roudnev
> > > > (I did not rated firewalls etc). > > Actually, an automated script or manual scan can find it trivially. > All you have to do is a quick port scan, looking for this: We can make an experiment: - I put such system (with ssh) on /26 network; - you scan it, find and report me time and bandwid

Re: sniffer/promisc detector

2004-01-20 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, "Alexei Roudnev" writes: > > >> >> Uhm, that would be wrong. This is simply "security through obscurity". >Yes, it is wrong for the _smart books_. But it works in real life. Of >course, it should not be the last line of defense; but it works as a first >line very e

Re: sniffer/promisc detector

2004-01-20 Thread Niels Bakker
* [EMAIL PROTECTED] (Dave Israel) [Tue 20 Jan 2004, 18:48 CET]: > On 1/20/2004 at 09:18:07 -0800, Alexei Roudnev said: [..] >> - unpatched sshd on port 30013 - safety is 7 (higher) because no one >> automated script can find it, and no one manual scan find it in reality > Actually, an automated sc

Re: sniffer/promisc detector

2004-01-20 Thread haesu
> PS. Sniffer... there are not any way to detect sniffer in the non-switched > network, and there is not much use for sniffer in switched network, if this > network is configured properly and is watched for the unusial events. depends on brand and model of switch $ portinstall ds

RE: sniffer/promisc detector

2004-01-20 Thread Henry Linneweh
Remote power on :P   -HenryMichel Py <[EMAIL PROTECTED]> wrote: > Alexei Roudnev wrote:> - turn off power - safety is 10. Secure> system, is a dark system.I have to disagree on this one; there is WOL (Wake-up On Lan), thesystem can be lit remotely.- turn off power - safety is 9- Unplug all cords -

Re: sniffer/promisc detector

2004-01-20 Thread Dave Israel
On 1/20/2004 at 09:18:07 -0800, Alexei Roudnev said: > > > > > > Uhm, that would be wrong. This is simply "security through obscurity". > Yes, it is wrong for the _smart books_. But it works in real life. Of > course, it should not be the last line of defense; but it works as a first > line ve

RE: sniffer/promisc detector

2004-01-20 Thread Michel Py
> Alexei Roudnev wrote: > - turn off power - safety is 10. Secure > system, is a dark system. I have to disagree on this one; there is WOL (Wake-up On Lan), the system can be lit remotely. - turn off power - safety is 9 - Unplug all cords - safety is 10 Michel.

Re: sniffer/promisc detector

2004-01-20 Thread Alexei Roudnev
> > Uhm, that would be wrong. This is simply "security through obscurity". Yes, it is wrong for the _smart books_. But it works in real life. Of course, it should not be the last line of defense; but it works as a first line very effectively. If I rate safety as a number (10 is the best, 0 is t

Re: sniffer/promisc detector

2004-01-19 Thread Valdis . Kletnieks
On Mon, 19 Jan 2004 23:26:30 MST, Brett Watson <[EMAIL PROTECTED]> said: > > hacked? (Answer - you will never be hacked, if > > you use nonstandard port, except if you attracks someone by name, such as > > _SSH-DAEMOn.Rich-Bank-Of-America.Com_. > Go grab nessus (www.nessus.org), modify the code

Re: sniffer/promisc detector

2004-01-19 Thread Brett Watson
>> i wish you were right. i wish you were even close to right. but we've > been >> attacked many times over the years by some extremely smart adolescent >> psychopaths -- where adolescence is a state of mind in this case, rather >> than of years -- and i wish very much that they would either sto

Re: sniffer/promisc detector

2004-01-19 Thread Alexei Roudnev
> > i wish you were right. i wish you were even close to right. but we've been > attacked many times over the years by some extremely smart adolescent > psychopaths -- where adolescence is a state of mind in this case, rather > than of years -- and i wish very much that they would either stop be

Re: sniffer/promisc detector

2004-01-19 Thread Scott McGrath
That's what I assumed but I asked the question anyhow just to confirm my assumption(s). Scott C. McGrath On Mon, 19 Jan 2004, Gerald wrote: > On Sat, 17 Jan 2004, Scott McGrath wrote: > > > The question here is what are you trying to defend against?. > > If that q

Re: sniffer/promisc detector

2004-01-19 Thread Paul Vixie
let's be careful out there: > Criminal hackers _are_ stupid (like most criminals) for purely economical > reasons: those who are smart can make more money in various legal ways, > like by holding a good job or running their own business. Hacking into > other people's computers does not pay well

Re: sniffer/promisc detector

2004-01-19 Thread Gerald
On Sat, 17 Jan 2004, Scott McGrath wrote: > The question here is what are you trying to defend against?. If that question was directed at me, I am just checking to make sure nothing is new on the packet sniffing / detecting scene that I haven't heard about. It also seemed to me to have been a lo

Re: sniffer/promisc detector

2004-01-19 Thread Gerald
On Sat, 17 Jan 2004, Sam Stickland wrote: > In an all switched network, sniffing can normally only be accomplished with > MAC address spoofing (Man In The Middle). Watching for MAC address changes > (from every machines perspective), along with scanning for seperate machines > with the same ARP

Re: sniffer/promisc detector

2004-01-19 Thread Vadim Antonov
Criminal hackers _are_ stupid (like most criminals) for purely economical reasons: those who are smart can make more money in various legal ways, like by holding a good job or running their own business. Hacking into other people's computers does not pay well (if at all). Those who aren't in th

Re: sniffer/promisc detector

2004-01-18 Thread E.B. Dreger
DJ> Date: Sat, 17 Jan 2004 14:57:19 -0500 DJ> From: Deepak Jain DJ> I know most people don't take the time to hard code their DJ> MACs onto their switch ports, but it really only takes a few DJ> seconds per switch with a little cutting & pasting -- as DJ> customer switches a network port, they j

Re: sniffer/promisc detector

2004-01-17 Thread Alexei Roudnev
- look onto the standard, cage like, mouse - trap with a > > piece of cheese inside. -:) > > > > - Original Message - > > From: "Rubens Kuhl Jr." <[EMAIL PROTECTED]> > > To: <[EMAIL PROTECTED]> > > Sent: Friday, January 16, 2004 3:18

Re: sniffer/promisc detector

2004-01-17 Thread Valdis . Kletnieks
On Sat, 17 Jan 2004 11:30:13 PST, Donovan Hill said: > Maybe this is just a stupid comment, but if the original poster is that > concerned with their LAN being sniffed, then maybe they should consider using > IPSec on their LAN. Amen to that. It's actually easier to sleep at night if you start of

Re: sniffer/promisc detector

2004-01-17 Thread Deepak Jain
It is also possible to sniff a network using only the RX pair so most of the tools to detect cards in P mode will fail. The new Cisco 6548's have TDR functionality so you could detect unauthorized connections by their physical characteristics. But there are also tools like ettercap which exploit

Re: sniffer/promisc detector

2004-01-17 Thread Donovan Hill
On Saturday 17 January 2004 11:18 am, Scott McGrath wrote: > It is also possible to sniff a network using only the RX pair so most of > the tools to detect cards in P mode will fail. The new Cisco 6548's have > TDR functionality so you could detect unauthorized connections by their > physical cha

Re: sniffer/promisc detector

2004-01-17 Thread Donovan Hill
On Saturday 17 January 2004 11:18 am, Scott McGrath wrote: > It is also possible to sniff a network using only the RX pair so most of > the tools to detect cards in P mode will fail. The new Cisco 6548's have > TDR functionality so you could detect unauthorized connections by their > physical cha

Re: sniffer/promisc detector

2004-01-17 Thread Valdis . Kletnieks
On Sat, 17 Jan 2004 12:55:17 EST, [EMAIL PROTECTED] said: > by the time you think your enemy is less capable than you, you've already lost > the war. On the other hand, does the fact that police usually only catch the stupid crooks mean that police forces are a bad idea? 1) How often is your sit

Re: sniffer/promisc detector

2004-01-17 Thread Scott McGrath
land wrote: > > > - Original Message - > From: "Laurence F. Sheldon, Jr." <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Friday, January 16, 2004 10:49 PM > Subject: Re: sniffer/promisc detector > > > > > > Gerald wrote: > &g

Re: sniffer/promisc detector

2004-01-17 Thread haesu
PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Friday, January 16, 2004 3:18 PM > Subject: Re: sniffer/promisc detector > > > > > > > > That is a battle that was lost at its beginning: the Ethernet 802.1d > > paradigm of "don't know where to se

Re: sniffer/promisc detector

2004-01-17 Thread Sam Stickland
- Original Message - From: "Laurence F. Sheldon, Jr." <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, January 16, 2004 10:49 PM Subject: Re: sniffer/promisc detector > > Gerald wrote: > > > > Subject says it all. Someone asked the other

Re: sniffer/promisc detector

2004-01-17 Thread Alexei Roudnev
nside. -:) - Original Message - From: "Rubens Kuhl Jr." <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, January 16, 2004 3:18 PM Subject: Re: sniffer/promisc detector > > > That is a battle that was lost at its beginning: the Ethernet 802.1d > paradigm

Re: sniffer/promisc detector

2004-01-16 Thread Chris Brenton
On Fri, 2004-01-16 at 18:00, Gerald wrote: > > I should probably mention that I've already started looking at antisniff. > I was hoping to find something that was currently maintained and still > free while I investigate antisniff's capabilities. Antisniff is still the best software based tool fo

Re: sniffer/promisc detector

2004-01-16 Thread Steven M. Bellovin
In message <[EMAIL PROTECTED]>, "Laurence F. Sheldon, Jr." writes: > >Gerald wrote: >> >> Subject says it all. Someone asked the other day here for sniffers. Any >> progress or suggestions for programs that detect cards in promisc mode or >> sniffing traffic? > >I can't even imagine how one might

Re: sniffer/promisc detector

2004-01-16 Thread Damian Gerow
Thus spake Gerald ([EMAIL PROTECTED]) [16/01/04 18:32]: > Subject says it all. Someone asked the other day here for sniffers. Any > progress or suggestions for programs that detect cards in promisc mode or > sniffing traffic? There's an art to detecting promiscuous devices.[1] A good starting po

Re: sniffer/promisc detector

2004-01-16 Thread Rubens Kuhl Jr.
ery other swith vendor has its own non-IEEE 802 compliant way of making a switched network more secure. Rubens - Original Message - From: "Gerald" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, January 16, 2004 8:35 PM Subject: sniffer/promisc detector >

RE: sniffer/promisc detector

2004-01-16 Thread Wojtek Zlobicki
at a swithport with only one MAC address cached. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Gerald Sent: Friday, January 16, 2004 5:35 PM To: [EMAIL PROTECTED] Subject: sniffer/promisc detector Subject says it all. Someone asked the other day her

Re: sniffer/promisc detector

2004-01-16 Thread Joel Jaeggli
if you have multiple network interfaces you can insure that the one doing the snooping is undetectable by the tools that people wrote to detect promiscious ethernets... joelja On Fri, 16 Jan 2004, Laurence F. Sheldon, Jr. wrote: > > Gerald wrote: > > > > Subject says it all. Someone asked t

Re: sniffer/promisc detector

2004-01-16 Thread Gerald
On Fri, 16 Jan 2004, Gerald wrote: > Subject says it all. Someone asked the other day here for sniffers. Any > progress or suggestions for programs that detect cards in promisc mode or > sniffing traffic? I should probably mention that I've already started looking at antisniff. I was hoping to f

Re: sniffer/promisc detector

2004-01-16 Thread Laurence F. Sheldon, Jr.
Gerald wrote: > > Subject says it all. Someone asked the other day here for sniffers. Any > progress or suggestions for programs that detect cards in promisc mode or > sniffing traffic? I can't even imagine how one might do that. Traditionally the only way to know that you have a mole is to enc

sniffer/promisc detector

2004-01-16 Thread Gerald
Subject says it all. Someone asked the other day here for sniffers. Any progress or suggestions for programs that detect cards in promisc mode or sniffing traffic? Gerald