On Thu, 21 Feb 2002, Sumit Dhar wrote:

> Hello All,
>
> I was wondering the other day as to how one could go about detecting a
> sniffer on the network. If it is a Shared Ethernet, I wouldn't even
> try... but on a Switched Ethernet, I feel there still is a chance.

Finding a sniffer on a switched or broadcast network carry about the same
difficulty, and techniques for finding a sniffer on one can be used on the
other provided it is not a physical compromise like gaining access to a
wiring closet.  However, the symptoms of sniffing on a switched network
are different, and easier to spot.

>       1. What would be the best method to see if someone is carrying
>       out ARP-Spoofing?

The best way to detect it is by using port level security on your switch.
Several vendors allow you to configure port level security on their
switches to allow traffic from as few as one or a list of many MAC
addresses that sit on that port.  I have not worked with all of them
personally, but a log entry should be generated when traffic from an
unauthorized MAC or at the least the traffic should be dropped.

So, let's say the CEO has a machine in his office, and his switched port
allows his MAC address to talk on that port.  Now, for some reaon, his
machine is trying to talk on a port in the conference room and it's
could be that the machine is a laptop and the CEO is giving a presentation
in the conference room, or something fishy is going on.  Either way, you
know about it now and even if it is a false alarm the risk is mitigated.

>       2.  Would it be possible to locate a machine that is flooding
>       the network with fake MAC replies?

The easiest way would once again be using port level security.  Your
switch reports that Port 7/1 of your ethernet switch is dropping traffic
because unauthorized MAC addresses are trying to talk on that port.  That
port leads to an unused office in the back of the building, and you find
someone claiming to be a telephone repairman plugged into your network.
It could be that he's there on legitimate business and is just trying to
get his e-mail from the telco network, but given that his laptop keeps
changing MAC addresses and he's not running Windows you highly doubt it.
Either way, it's time to call security and start verifying this guys
credentials.

If your switch doesn't support port level security, then you could always
try tracing it back via the segment uplinks if you have them.  If you
don't and your topology is flat, then it's a bit harder.

> Also, what would be the other methods that a person *MIGHT* be used to
> sniff in a switched environment?

My favorite way is gaining access to the switching uplinks.  Put an
ethernet tap in-line in the wiring closet and sniff away.  They won't be
able to detect your sniffer either whithout physically examining the
wiring closet.  And it's not hard to make your equipment blend in.

> Also let me clarify, each user on this network controls his machine
> completely as the root user, no user has access to every machine..

That is very bad.  I'm currently working a contract with a large base of
UNIX desktops, and no one but a small group of system administrators has
access to the root account.  Unless there is a very valid reason for each
person to have total control of their own machine, I'd replace the setup
with something like a secured NIS-type implementation and restricting
user access.

--
Joseph W. Shaw II - CCNA
Former Sr. Security Specialist: Enron Broadband Services
Please hire me before I resort to a life of crime, panhandling, or Amway.



Reply via email to