![]() I've read a lot of information on ARP spoofing/poisoning but can't find much at all on the specifics of Cain's sniffer. ![]() How is this possible on a switched environment without using APR? I checked the ARP tables on a couple other machines while running the sniffer and they all had the correct ARP entries for the gateway.Īt first I thought for some odd reason we may have had hubs on our network but I checked into it and it's definitely all switched. Somehow, Cain is still able to pick up a lot of SNMP, MSKerb5-PreAuth, Telnet, LDAP, HTTP, and FTP passwords. ![]() I've purposefully avoided using APR so that my co-workers won't freak out at security certificate errors and have only been using the "sniffing" functionality. I have recently been performing a security audit at work (sanctioned of course) and have seen some interesting behaviour from Cain and Abel.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |