I would suggest using Ettercap (http://ettercap.sourceforge.net) to sniff in 
the switched network.

Sniff Host A from Host B.  Have Ethereal (www.ethereal.com) capture on Host 
C.  You might find something interesting with the ARP requests/changes.

Another thing you can do (this is what I do) is install Arpwatch 
(www.securityfocus.com/tools/142).  Since Ettercap poisons the ARP tables, 
this will set Arpwatch off and you'll know something funny is going on by the 
mass amounts of e-mails about stations being flipped and whatnot.

Hope this helps!

-Matt

On Thursday 21 February 2002 01:29, Sumit Dhar wrote:
> Hello All,
>
> I was wondering the other day as to how one could go about detecting a
> sniffer on the network. If it is a Shared Ethernet, I wouldn't even
> try... but on a Switched Ethernet, I feel there still is a chance.
>
> Specifically,
>
>       1. What would be the best method to see if someone is carrying
>       out ARP-Spoofing?
>
>       2.  Would it be possible to locate a machine that is flooding
>       the network with fake MAC replies?
>
> Also, what would be the other methods that a person *MIGHT* be used to
> sniff in a switched environment?
>
> Most of the anti-sniffing tools (from L0pht etc.) are not very
> reliable.. any other tools that you people are aware of? And lastly,
> though I think it is practically impossible, would it be possible to
> detect a sniffer on a Shared Ethernet (where it is usually passive).
>
> Also let me clarify, each user on this network controls his machine
> completely as the root user, no user has access to every machine..
>
> Regards
> Dhar

Reply via email to