[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [Full-Disclosure] Caching a sniffer
- To: "'Full Disclosure'" <full-disclosure@xxxxxxxxxxxxxxxx>
- Subject: RE: [Full-Disclosure] Caching a sniffer
- From: "Justin Baldini" <jbaldini@xxxxxxxxxxxxxxxx>
- Date: Fri, 12 Mar 2004 13:19:14 -0500
It would probably be better to build it at the switch level. I would think
there would be a change in resistance when there is ANYTHING added/removed
from the cabling that could be measured by the switch. You could then have
it disable that segment upon such detection if you'd like.
-jb
-----Original Message-----
From: full-disclosure-admin@xxxxxxxxxxxxxxxx
[mailto:full-disclosure-admin@xxxxxxxxxxxxxxxx]On Behalf Of Simon
Richter
Sent: Friday, March 12, 2004 7:31 AM
To: 'Full Disclosure'
Subject: Re: [Full-Disclosure] Caching a sniffer
Hi,
I wonder whether it would be feasible to build network cards that could
report the signal reflection characteristics of the link to make it
possible to detect sniffing equipment cut into a network cable (should
catch magnetic coupling as well).
I bet some security conscious folks will pay lots of $$$ for that.
Simon
--
GPG Fingerprint: 040E B5F7 84F1 4FBC CEAD ADC6 18A0 CC8D 5706 A4B4
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html