From: Alexandre Verriere (maxwell@nskb.net)
Date: Sun Sep 05 2004 - 05:17:12 EDT
Corrected Post:
> You could try etherape[1] on box linked to the monitoring port of the
> switch, this will show you
> how the traffic is between the boxes. Once excluded the servers ,
> you'll probably see some convergence
> in the traffic and find out who runs the proxy.
>
> [1] http://etherape.sourceforge.net/
>
NB: There was a error in my previous post, the proggy i wanted to
mention was etherape.
-- ''~`` ( o o ) +------------------------.oooO--(_)--Oooo.-----------------------+ Alexandre Verriere (Maxwell) - http://www.nskb.net ------------------------------------------------------------------------------ Ethical Hacking at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less to facilitate one-on-one interaction with one of our expert instructors. Check out our Advanced Hacking course, learn to write exploits and attack security infrastructure. Attend a course taught by an expert instructor with years of in-the-field pen testing experience in our state of the art hacking lab. Master the skills of an Ethical Hacker to better assess the security of your organization. http://www.infosecinstitute.com/courses/ethical_hacking_training.html -------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:03 EDT