RE: Scan for "outsider" Pcs on network
From: Craig Chamberlain
Date: Tue Sep 12 2006 - 12:09:39 CDT
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
Or spoofing a MAC address, which I find works OK even when the host
being spoofed is connected to the same port at the same time, and works
OK when the MAC is tied to a DHCP reservation (the switch has no way of
knowing there area actually two NICS attached). In fact, a DHCP
reservation is somewhat preferable if trying to go unnoticed during an
"inside" pentest - if the intruder is spoofing hostnames as well as MAC
addresses then it's not very noticeable from a log perspective;
duplicate netBIOS name events would show up but netBIOS can be shut off.
Dynamic DNS updates can also be disabled at the windows client. DHCP
logs would show the lease being renewed by both hosts, but would
probably not look much different from the usual lease renewal activity.
Out of curiosity, what is the largest hard-coded ARP table
implementation that has been performed or observed by the list? Is it
something that is only done in SCIFs or have people implemented it in
general-purpose environments?
> -----Original Message-----
> From: listbouncesecurityfocus.com
> [mailto:listbouncesecurityfocus.com] On Behalf Of Robert D.
> Holtz - Lists
> Sent: Monday, September 11, 2006 4:18 PM
> To: 'Lim Ming Wei';
> focus-idssecurityfocus.com
> Subject: RE: Scan for "outsider" Pcs on network
>
> If security is paramount then you would want to setup your
> switching fabric to perform MAC based restrictions by port.
> This is one of the best ways of making sure you know what's
> hooked up. Anyone just trying to hook up to a port will get nowhere.
>
> Of course, this doesn't prevent someone from going up to a
> machine that's already allowed on the 'net and doing what
> ever they please.
>
> -----Original Message-----
> From: listbouncesecurityfocus.com
> [mailto:listbouncesecurityfocus.com] On Behalf Of Lim Ming Wei
> Sent: Saturday, September 09, 2006 5:08 AM
> To: focus-idssecurityfocus.com
> Subject: RE: Scan for "outsider" Pcs on network
>
> I come across a program call air-snare that is able to detect
> that. But you will need to have a list of all your systems
> mac address. It is like an IDS program. I believe that most
> of the IDS program is able to do that.
>
>
> -----Original Message-----
> Sent: Friday, March 03, 2006 7:48 AM
> To: focus-idssecurityfocus.com
> Subject: Scan for "outsider" Pcs on network
>
> Is there a way to setup a scan and be notified of an
> intruding pc that is physically plugged into the network?
> When you have an enviroment with a large amount of network
> jacks, it's hard to make sure the ones no longer in use are
> turned off, and that no "visitors" have sat down to use your
> network connections, esp. if you have a large amount of
> contractors in and out. It got me to searching the net, and
> so far I have found one cemmercial product that can do it,
> but nothing else. Any suggestions?
>
> --------------------------------------------------------------
No comments:
Post a Comment