-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I believe UCD campus is using switched network, however, this does not ensure the that sniffer won't work. Through a technique 'arp poison', modern sniffer can even sniff the switched network. I got to know this several days ago when I suddently found the following site ;-)
http://ettercap.sourceforge.net On Sat, 13 Oct 2001, ME wrote: > If the network is a switched network between the two hosts, then you have > a higher level of security from sniffing since the sniffer would see > nothing but the first ethernet frame from unknown MAC to unknown > MAC/Broadcast MAC unless the switch was configured (puposefully) to flood > to a sniffer-port with a sniffer running on it, or "break" the switch and > make it into a repeater and then see all traffic (prob result in a > RMON/SNMP trap/trigger if the switch was well set up and notify the > network admin) and then have a sniffer on one of those ports being > flooded. > > Heh heh heh... O:> > > -ME -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iEYEARECAAYFAjvI+c0ACgkQVieKrU8JxnmkJQCdGIj/dvhU4hs4eyDXDL4s6YSp TyEAnA8jQzKRq/hxqfxqXwQ4W2Khe8R1 =eUOr -----END PGP SIGNATURE-----
