(03-20-2018, 04:25 AM)Skullmeat Wrote: (03-19-2018, 11:38 PM)x n Wrote: There's really no way to get caught doing something like this if you're on the same LAN as everyone else as long as your computer's name isn't anything that personally identifies you. I'd do it in the bathroom though considering the fact that cameras + network traffic timestamps can get you caught.
With regards to actually capturing data, there's plenty of shit you can find by googling "how to sniff traffic of computers on your network"
This is so wrong I dont know where to begin. First off, routers and switches extensively monitor what goes in and out of them. In addition, a properly configured switch will have port management. In fact the cisco devices have mac address limits imposed, possilby even static ones. Attempt to access that port with the wrong mac and the link goes down. The switch will shut off the port. Its even possible that the system will alert the admin of the violation, essentially giving your location away. Then theres the matter of vlans. Most networks have vlans seperating their less secure public networks from their secure, mission critical ones. Finally theres Access Control Lists. The firewall will allow or deny access from one network to another, and the options can even be specified down to a specific host. Again, unauthorized access attempts will likely trigger an alert. And security will be on your ass in a hurry, depending on how sensitive their system is. It's still possible to get around these measures, as no system is completely secure, but someone with your knowlege isn't going to be able to pull it off.
Here comes another guy wanting to make me seem wrong who I have to tell why they're wrong...
First of all, the OP is talking about a local public library, all of which have public guest networks, which is the network the OP presumably would be capturing traffic from, so there goes your "VLANs will stop this" and "lol do u even kno wat an ACL is noob?" arguments. Secondly, a MAC address limit isn't going to stop an ARP poisoning attack which I'm 99% sure is what the OP had in mind when he said "capturing passwords from the network". MAC address limiting is a countermeasure for MAC overflow attacks, but I'm sure you didn't know that since the entirety of your post came from googling "switch security measures" and finding
http://www.ciscopress.com/articles/artic...?p=1181682. The only thing that will stop ARP poisoning in this scenario is dynamic ARP inspection paired with DHCP snooping (and ARP spoofing detection software which a public local library isn't going to pay for or take the time to implement properly), which a random local library guest network
isn't going to have; a static content addressable memory table isn't even going to exist in this case considering it's a guest network where hundreds of different people would be connecting and disconnecting every day. No links would be going down and no location would be given away because the OP would be connecting through a wireless interface.
The funny thing is that my post wasn't even about the ways he could go about capturing traffic and hacking stuff, it was just about what to do to prevent getting caught, yet you changed the subject to how the attack could be mitigated and made yourself look like you had no idea what you were talking about for no reason. It was a good effort though. If you're going to take all of your information from a cisco article and present it as if you already knew it then at least include a link at the bottom. If you're genuinely interested learning more about this kind of stuff then then look up switch spoofing and double tagging since I've already told you about MAC overflows and ARP spoofing.