if you have multiple network interfaces you can insure that the one doing the snooping is undetectable by the tools that people wrote to detect promiscious ethernets... joelja On Fri, 16 Jan 2004, Laurence F. Sheldon, Jr. wrote:
Gerald wrote:
Subject says it all. Someone asked the other day here for sniffers. Any progress or suggestions for programs that detect cards in promisc mode or sniffing traffic?
I can't even imagine how one might do that. Traditionally the only way to know that you have a mole is to encounter secrets that "had to" have been stolen.
-- -------------------------------------------------------------------------- Joel Jaeggli Unix Consulting joelja@darkwing.uoregon.edu GPG Key Fingerprint: 5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2