During the intelligence gathering phase of a penetration test, you come across a press release by a security products vendor stating that they have signed a multi-million dollar agreement with the company you are targeting. The contract was for vulnerability assessment tools and network based IDS systems. While researching on that particular brand of IDS you notice that its default installation allows it to perform sniffing and attack analysis on one NIC and caters to its management and reporting on another NIC. The sniffing interface is completely unbound from the TCP/IP stack by default. Assuming the defaults were used, how can you detect these sniffing interfaces?
When a Nic is set to Promiscuous mode it just blindly takes whatever comes through to it network interface and sends it to the Application layer. This is why they are so hard to detect. Actually you could use ARP requests and Send them to every pc and the one which responds to all the requests can be identified as a NIC on Promiscuous mode and there are some very special programs that can do this for you. But considering the alternatives in the question the right answer has to be that the interface cannot be detected.
Brett
2 months agoVincenza
17 days agoAntonio
24 days agoLisandra
1 months agoGolda
1 months agoHoward
2 months agoJeffrey
1 months agoJutta
1 months agoRoslyn
1 months agoMireya
2 months agoRanee
2 months agoJaime
2 months agoChantay
2 months agoArlene
2 months agoKanisha
2 months agoStephaine
2 months agoNikita
2 months agoDierdre
3 months agoNa
3 months agoChana
3 months agoBette
3 months agoBettina
2 months agoLettie
2 months agoAmber
2 months ago