Jump to content
Nytro

And away we spoof!!!

Recommended Posts

Posted

And away we spoof!!!

Table of Contents
And away we spoof!!!..........................................................................................................................................1
Notes on stopping arpspoof, the program................................................................................................1
Dsniff utilities..........................................................................................................................................1
Bandwidth Control.............................................................................................................................................3
Bandwidth usage.................................................................................................................................................5
MRTG......................................................................................................................................................5
Interpreting MRTG..................................................................................................................................5
IP Flow Meter (ipfm)...............................................................................................................................6
Interpreting ipfm output..............................................................................................................7
IPTraf.......................................................................................................................................................8
Berkeley Packet Filter (bpf) Quickie.......................................................................................................9
Tcpdump..................................................................................................................................................9
Interpreting tcpdump traffic......................................................................................................10
NTOP.....................................................................................................................................................11
Conclusion.........................................................................................................................................................12
Defenses..............................................................................................................................................................13
Read Carefully!......................................................................................................................................13
The Heart of the monitoring............................................................................................................................15
Essential preparation........................................................................................................................................17
Software Used........................................................................................................................................18
Ripped from the Headlines..............................................................................................................................20
Ngrep......................................................................................................................................................21
Snort.......................................................................................................................................................21
Security Considerations....................................................................................................................................23
Data Security..........................................................................................................................................24
Remote Access.......................................................................................................................................25
Restricting PAM?style..........................................................................................................................27
The chosen are few................................................................................................................................28
Hand in the googie jar............................................................................................................................28
Other considerations..............................................................................................................................29
Notes.........................................................................................................................................31
Thanks................................................................................................................................................................32
'To spoof or not to spoof, that is the packet'...................................................................................................32
Dsniff 'n the Mirror..........................................................................................................................................33

Download:

http://www.linuxsecurity.com/docs/PDF/dsniff-n-mirror.pdf

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...