[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] Network Sniffing
- To: "Crehan, Joe (EM, ITS, Contractor)" <Joe.Crehan@xxxxxx>
- Subject: Re: [Full-Disclosure] Network Sniffing
- From: Ben Nelson <lists@xxxxxxxxxxxx>
- Date: Tue, 30 Nov 2004 13:08:12 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Take a look at:
http://www.insecure.org/tools.html
I've used almost all of the tools on that list at one time or another. A
list of my favorites (sniffer-type tools) would include:
ntop -- great at getting a good overall picture (top-talkers, etc)
ethereal -- good protocol analysis, reads pcap (tcpdump) output natively
snort -- for all your IDS needs
dsniff -- for monitoring traffic and capturing passwords when necessary
tcpdump -- I use this most often. Great for quick, down-n-dirty sniffs.
- --Ben
Crehan, Joe (EM, ITS, Contractor) wrote:
| Gentleman,
|
| I have been having all kinds of quirky network problems at one of my
| facilities. I always used SnifferPro to identify ?top talkers? and
| babbling machines.
|
| Now that I work for ?The Hive? I am no longer allowed to purchase
| licenses for such wonderful products.
|
| So the question is more of a poll of what the ?best of the best? use for
| there networks.
|
| M$ and *NIX cheap and free.
|
|
| ***Joe Crehan*
|
| Customer Engineer
|
| GE Infrastructure Deskside Support Team
|
| GE Information Technology solutions, Inc.
|
| T 508-698-7567
|
| F 508-698-6940
|
| E ___joe.crehan@xxxxxxx <mailto:joe.crehan@xxxxxx>
|
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
iD8DBQFBrNMs3cL8qXKvzcwRAsP/AJ4+tGgWyywmgD/BnoUPFSw5hraUNwCeMbD7
U6nNLs3m4ZaEr02JT9+jPps=
=zmqp
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html