Hacking For Beginners – Manthan Desai
2010
a word or use proper names. Be inventive, use special characters and have 8 characters in your password.” I am surethere are hundreds of similar postings on internal websites throughout the world that don’t m ake it public as they have.
Antisniff also helps you find those system administrators who run a sniffer to find out what is wrong with their localnetwork, but forget to ask for authorization beforehand. If you need to run a sniffer, then you should get permission inwriting. If your Security Administrator is running Antisniff, then there is a good chance they will find it and you will have toexplain why you are running a sniffer without authorization. Hopefully your security policy has a section on sniffers andwill provide some guidance if you need to run a sniffer.
At the time of this writing, Antisniff version 1.021 is the current release. There is a nice GUI available for Windows95/98/and NT machines. A command line version is also available for Solaris, OpenBSD, and Linux. This version of Antisniffonly works in a “flat non - switched” environment. If your network is designed with routers and switches, then Antisniffdoes not have the same functionality as in a non-switched environment. You can only use it on local networks that do notcross a router or switch. According to Lopht’s website, the next major release of Antisniff will have ability to figure o utif a computer is running in promiscuous mode over routers and switches. The next release of Antisniff should definitely bemore beneficial to system administrators because the price of switches are coming down and most companies areupgrading to switches to obtain 100/Full Mbps speeds. Even though you have a totally switched environment, you are stillnot out of the water. There are still firewalls, proxies, webservers, ftp servers, etc. where crackers still have the ability toinstall a sniffer and capture data locally. The only difference is, you have taken away their ability to capture data over thenetwork.
Antisniff can also be used by blackhats to find intrusion detection systems. know where your intrusion detectionsystems are, then they can become stealth attackers, causing you much because you just spend $150,000 on a newintrusion detection system and they found a way to bypass it.
www.hackingtech.co.tv
Page 84