Its been awhile since I've messed with sniffing
through a switch. I used a suite called nemesis. I
think its at packetfactory.org or .net something like
that. I would use the nemesis-arp tool to send a ton
of fake arp packets through the switch to create the
illusion that the spoofed mac address was actually on
the port I was on. I performed it on a Cisco Catalyst
1600 maybe. I also sent some fake ip packets through
there returning the same result. Just set your packet
sniffer to listen and start building those fake
packets. Your sniffer will go crazy.


--- Ryan <[EMAIL PROTECTED]> wrote:
> > Other ways, which may not be as safe technically,
> is to flood the switch
> > with spoofed arp packets thus making the switch
> lose track of who is who
> and
> > start acting in a hub fashion (only works on some
> switches).
> 
> I was wondering if anyone has had any experiences
> with the following two
> Switches in terms of both ARP spoofing to drop the
> switch to a hub state,
> and any other security vulnerabilities/risks in
> general.
> 
> SMC's page on this product is severely lacking in
> information so I've used a
> URL to one of their suppliers which actually shows
> what the switch looks
> like and has detailed information on it, rather than
> using SMC's link).
> 
> SMC's Barricade 4pt 10/100 Broadband Router/Switch
>
(http://www.futureshop.ca/catalog/proddetail.asp?logon=&langid=EN&dept=0&WLB
>
S=fs%2Dweb4&biasid=FFA738ECECAA4DA689DAAB0C91197922&sku_id=0665000FS10008877
> &catid=&newdeptid=1)
> 
> TRENDnet's TW100-S4W1CA 4-port DSL/Cable Modem
> Switch
> (http://www.trendware.com/products/TW100-S4W1CA.htm)
> 
> Thanks in advance,
> Ryan
> 


__________________________________________________
Do You Yahoo!?
Get email alerts & NEW webcam video instant messaging with Yahoo! Messenger
http://im.yahoo.com

Reply via email to