Nytro Posted August 31, 2012 Report Posted August 31, 2012 And away we spoof!!!Table of ContentsAnd away we spoof!!!..........................................................................................................................................1Notes on stopping arpspoof, the program................................................................................................1Dsniff utilities..........................................................................................................................................1Bandwidth Control.............................................................................................................................................3Bandwidth usage.................................................................................................................................................5MRTG......................................................................................................................................................5Interpreting MRTG..................................................................................................................................5IP Flow Meter (ipfm)...............................................................................................................................6Interpreting ipfm output..............................................................................................................7IPTraf.......................................................................................................................................................8Berkeley Packet Filter (bpf) Quickie.......................................................................................................9Tcpdump..................................................................................................................................................9Interpreting tcpdump traffic......................................................................................................10NTOP.....................................................................................................................................................11Conclusion.........................................................................................................................................................12Defenses..............................................................................................................................................................13Read Carefully!......................................................................................................................................13The Heart of the monitoring............................................................................................................................15Essential preparation........................................................................................................................................17Software Used........................................................................................................................................18Ripped from the Headlines..............................................................................................................................20Ngrep......................................................................................................................................................21Snort.......................................................................................................................................................21Security Considerations....................................................................................................................................23Data Security..........................................................................................................................................24Remote Access.......................................................................................................................................25Restricting PAM?style..........................................................................................................................27The chosen are few................................................................................................................................28Hand in the googie jar............................................................................................................................28Other considerations..............................................................................................................................29Notes.........................................................................................................................................31Thanks................................................................................................................................................................32'To spoof or not to spoof, that is the packet'...................................................................................................32Dsniff 'n the Mirror..........................................................................................................................................33Download:http://www.linuxsecurity.com/docs/PDF/dsniff-n-mirror.pdf Quote