Date: Thu, 18 Jan 1996 16:22:35 +1030 (CST) From: Michael Smith <msmith@atrad.adelaide.edu.au> To: philw@megasoft.tic.ab.ca (Phillip White) Cc: msmith@atrad.adelaide.edu.au, freebsd-questions@freebsd.org Subject: Re: ethernet packet sniffer. Message-ID: <199601180552.QAA05686@genesis.atrad.adelaide.edu.au> In-Reply-To: <Pine.BSF.3.91.960117030452.14808A-100000@megasoft.tic.ab.ca> from "Phillip White" at Jan 17, 96 03:16:59 am
next in thread | previous in thread | raw e-mail | index | archive | help
Phillip White stands accused of saying: > I've tried this and it does not show everything. On Solaris I can Correctly configured (as I suggested), it will show _everything_, providing your machine is fast enough to keep up. > actually watch the data being received from the news pull to INN, meaning > if I was fast enough (impossible) I could read the news as it comes > through the feed. The same with people logging into our Livingston > portmaster, I can see that they are messing around with commands that > they have no access to cause I can see that they are attempting passwd > hacks cause I can see the passwds they are entering at the password: > prompt(normally not seen any other way) or that they are entering enable > commands etc that they have no right to access. There is no watch Ah. You still don't want an Ethernet sniffer, what you appear to want is a protocol analyser. Very different toy. A couple of URL's were mentioned on this thread, which should get you off in the right direction. > Phil... -- ]] Mike Smith, Software Engineer msmith@atrad.adelaide.edu.au [[ ]] Genesis Software genesis@atrad.adelaide.edu.au [[ ]] High-speed data acquisition and (GSM mobile) 0411-222-496 [[ ]] realtime instrument control (ph/fax) +61-8-267-3039 [[ ]] "Who does BSD?" "We do Chucky, we do." [[
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199601180552.QAA05686>