> i recently installed a sniffer in my college server Red Hat 5.2 and got
> the a tcp /ip
> account of my college ,and i used it for free
> some other chaps (got some other password)
U naughty u ... .
> Now i uninstalled the sniffer and got thhe server working back to
> regular net acesss from Windows clients..
Wise choice ..
> I did this trick to get tnhe tcp/ip passwd ...
An archaic method ..
> Now maybe if someone else wants to install a sniffer
> How do i prevent him from installing one?
Well u can't but I guess you do not have people who are technically
competent in your college..
At our office only admins are allowed to use (or for that fact know ) about
sniffers ..
We have SSH in place to safeguard against that .. however there are
antisniffers which figure out which systems are in promiscuous mode .. once
identified the guy is in trouble .. there are several methods and they are
quite simple to identifiy systems with sniffers .. I used sniffers about a
year or so down the line .. still use them only if we have n/w connectivity
issues .. I guess its all upto u and ur moral sense .. If you respect others
privacy sniffers are a no . no
U'll realize it all when somebody uses a sniffer and gets your password ..
U know when someone uses your account .. Ouch .. It hurts .. ;-)
>
> And where do i make the neccessary changes ?
Well install an antisniffer .. there are plenty of them .. had seen some for
NT ... would not encourage the spread of these tools so no URL's
> BTW i got the souurce code from www.zing.net or .org (i keep forgetting
> URLS)
> How do i prevent my server from a spoof attack?
What kind of a spoof attack.. the IP spoof one ???
Regards
sandesh
>
>
>
>
> Aditya Kulkarni
> One byte,Two byte ,Three byte ,Four byte an int
>
>
>