Solved

Linux acting in promiscuous mode

Posted on 1998-07-02
2
203 Views
Last Modified: 2006-11-17
Hi there!
The question is that I want to setup a Linux Box with 2 ethernet cards running in promiscuous mode, and then plug it between 2 workstations to monitor network traffic without reconfigure any routing table and any network address from the workstations neither the Linux Box. I mean 2 eth cards without IP address.
Is it possible?, Are there other solutions?

Thank you in advance!
0
Comment
Question by:trickle
2 Comments
 
LVL 2

Expert Comment

by:jeffa072897
ID: 1584661
I'll make this a comment instead of an answer since i'm only 90% sure.

I don't think it cam be done without an IP address. Linux needs something to tell the kernel the ethernet(s) are up. This is done(usually) with ifconfig which needs an address in its argument.

You might try using private IP numbers that match the class of the networks you're monitoring(i.e. 192.168.x.x for class c). Then, using tcpdump I think you'll see everything on each network segment.

If that works you can run tcpdump in two console windows with each looking at one interface if you want.


0
 
LVL 3

Accepted Solution

by:
marcelofr earned 200 total points
ID: 1584662
Configure linux kernel as a bridge...
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now