Re: Sniffing on a switch

From: Stephen J. Smoogen (smooge@gmail.com)
Date: Sat Oct 29 2005 - 09:47:07 EDT


On 10/27/05, Andy Meyers <andy.meyers@hushmail.com> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Now i know people say you "cant" sniff on a switch and I know about ARP
> poisoning and MAC flooding. But there has to be another way. I have heard
> too many stories about "he sniffed my AIM conversation on a Cisco switch"
> (an example is in the most recent version of 2600). Does anyone know of any
> technique how to do this? Can you ARP poison a switch?
>
> Ashes

Well the easiest way of doing something like this is to just find an
ill-configured smart switch and taking it over. Ill-configured meaning
'default' or weak password, SNMP1, no patches, etc. You then can port
replicate the ports you want to your port and voila you have yourself
a very expensive hub.

--
Stephen J Smoogen.
CSIRT/Linux System Administrator
------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 
Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:06 EDT