sniffer/promisc detector

Alexei Roudnev alex at relcom.net
Thu Jan 22 07:32:59 UTC 2004


I saw such scanners 6 years ago (amazingly, they could not determine very
old OS and very oold services...).
But, just again, no one use it in automated scans over the  Internet. As I
was saying, port camuphlaging works as a very first line of defense - it
cuts 99% of all attacks and akllow you to deal with the rest 1%.

I'll measure time tomorrow... Such tools are usually very slow (and lost
20 - 50% of all packets, so to have a reliable result, you must scan host
2 - 4 times).


----- Original Message ----- 
From: "Crist Clark" <crist.clark at globalstar.com>
To: "Alexei Roudnev" <alex at relcom.net>
Cc: "Ruben van der Leij" <ruben-nanog at nutz.nl>; <nanog at merit.edu>
Sent: Wednesday, January 21, 2004 11:26 AM
Subject: Re: sniffer/promisc detector


> Alexei Roudnev wrote:
> >
> > Please, do it:
> >
> > time nmap -p 0-65535 $target
> >
> > You will be surprised (and nmap will not report applications; to test a
> > response, multiply time at 5 ).
>
> Yes. It will,
>
>   http://www.insecure.org/nmap/versionscan.html
>
> -- 
> Crist J. Clark                               crist.clark at globalstar.com
> Globalstar Communications                                (408) 933-4387




More information about the NANOG mailing list