Jump to content
Nytro

And away we spoof!!!

Recommended Posts

And away we spoof!!!

Table of Contents
And away we spoof!!!..........................................................................................................................................1
Notes on stopping arpspoof, the program................................................................................................1
Dsniff utilities..........................................................................................................................................1
Bandwidth Control.............................................................................................................................................3
Bandwidth usage.................................................................................................................................................5
MRTG......................................................................................................................................................5
Interpreting MRTG..................................................................................................................................5
IP Flow Meter (ipfm)...............................................................................................................................6
Interpreting ipfm output..............................................................................................................7
IPTraf.......................................................................................................................................................8
Berkeley Packet Filter (bpf) Quickie.......................................................................................................9
Tcpdump..................................................................................................................................................9
Interpreting tcpdump traffic......................................................................................................10
NTOP.....................................................................................................................................................11
Conclusion.........................................................................................................................................................12
Defenses..............................................................................................................................................................13
Read Carefully!......................................................................................................................................13
The Heart of the monitoring............................................................................................................................15
Essential preparation........................................................................................................................................17
Software Used........................................................................................................................................18
Ripped from the Headlines..............................................................................................................................20
Ngrep......................................................................................................................................................21
Snort.......................................................................................................................................................21
Security Considerations....................................................................................................................................23
Data Security..........................................................................................................................................24
Remote Access.......................................................................................................................................25
Restricting PAM?style..........................................................................................................................27
The chosen are few................................................................................................................................28
Hand in the googie jar............................................................................................................................28
Other considerations..............................................................................................................................29
Notes.........................................................................................................................................31
Thanks................................................................................................................................................................32
'To spoof or not to spoof, that is the packet'...................................................................................................32
Dsniff 'n the Mirror..........................................................................................................................................33

Download:

http://www.linuxsecurity.com/docs/PDF/dsniff-n-mirror.pdf

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...