From: Barrie Dempster (barrie@reboot-robot.net)
Date: Tue Nov 29 2005 - 04:34:21 EST
On Tue, 2005-11-29 at 08:19 +0200, Maher Odeh wrote:
> you can use ethereal to sniff the data
> And then to analyze it,
Or you could use an IDS (such as SNORT) with signatures for the
protocols in use, removing some of the manual work from the sniffing.
-- With Regards.. Barrie Dempster (zeedo) - Fortiter et Strenue "He who hingeth aboot, geteth hee-haw" Victor - Still Game blog: http://reboot-robot.net sites: http://www.bsrf.org.uk - http://www.security-forums.com ca: https://www.cacert.org/index.php?id=3
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:12 EDT