From: Stephen J. Smoogen (smooge@gmail.com)
Date: Sat Oct 29 2005 - 09:47:07 EDT
On 10/27/05, Andy Meyers <andy.meyers@hushmail.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Now i know people say you "cant" sniff on a switch and I know about ARP
> poisoning and MAC flooding. But there has to be another way. I have heard
> too many stories about "he sniffed my AIM conversation on a Cisco switch"
> (an example is in the most recent version of 2600). Does anyone know of any
> technique how to do this? Can you ARP poison a switch?
>
> Ashes
Well the easiest way of doing something like this is to just find an
ill-configured smart switch and taking it over. Ill-configured meaning
'default' or weak password, SNMP1, no patches, etc. You then can port
replicate the ports you want to your port and voila you have yourself
a very expensive hub.
-- Stephen J Smoogen. CSIRT/Linux System Administrator ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:06 EDT