Its been awhile since I've messed with sniffing through a switch. I used a suite called nemesis. I think its at packetfactory.org or .net something like that. I would use the nemesis-arp tool to send a ton of fake arp packets through the switch to create the illusion that the spoofed mac address was actually on the port I was on. I performed it on a Cisco Catalyst 1600 maybe. I also sent some fake ip packets through there returning the same result. Just set your packet sniffer to listen and start building those fake packets. Your sniffer will go crazy. --- Ryan <[EMAIL PROTECTED]> wrote: > > Other ways, which may not be as safe technically, > is to flood the switch > > with spoofed arp packets thus making the switch > lose track of who is who > and > > start acting in a hub fashion (only works on some > switches). > > I was wondering if anyone has had any experiences > with the following two > Switches in terms of both ARP spoofing to drop the > switch to a hub state, > and any other security vulnerabilities/risks in > general. > > SMC's page on this product is severely lacking in > information so I've used a > URL to one of their suppliers which actually shows > what the switch looks > like and has detailed information on it, rather than > using SMC's link). > > SMC's Barricade 4pt 10/100 Broadband Router/Switch > (http://www.futureshop.ca/catalog/proddetail.asp?logon=&langid=EN&dept=0&WLB > S=fs%2Dweb4&biasid=FFA738ECECAA4DA689DAAB0C91197922&sku_id=0665000FS10008877 > &catid=&newdeptid=1) > > TRENDnet's TW100-S4W1CA 4-port DSL/Cable Modem > Switch > (http://www.trendware.com/products/TW100-S4W1CA.htm) > > Thanks in advance, > Ryan > __________________________________________________ Do You Yahoo!? Get email alerts & NEW webcam video instant messaging with Yahoo! Messenger http://im.yahoo.com