Solved

Sniffing telnet session on a switch

Posted on 2004-08-12
4
742 Views
Last Modified: 2013-12-04
Hi

Is it true that you cannot sniff telnet sessions on a switch. For example if I want to sniff the telnet session I make from my Laptop to the cisco router. If my laptop that is going to make a telnet session to cisco session is connected to port 1 on switch the cisco router is connected to port 2 on the switch and my sniffing laptop is connected to port 3, then if the laptop is going to make a telnet session to router can my sniffing laptop capture the traffic in between them ? Or say if I am connected to completely different switch but still on the same network what will be the behavior then ?
0
Comment
Question by:kamal73
  • 2
4 Comments
 
LVL 32

Assisted Solution

by:Luc Franken
Luc Franken earned 125 total points
ID: 11781677
Hi kamal73,

A switch doesn't replicate the information to all ports, so you won't be able to sniff the data that way. To be able to sniff it, you'll have to exchange the switch for a hub, which is nothing more or less than a multi-port repeater, so all data will be send to all ports.

Greetings,

LucF
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 125 total points
ID: 11781697
LucF is correct

Telnet is about as secure as an open window (without SSH) but there are some exeptions to the rule

you CAN sniff an interface with third party software - and some are designed to solely monitor switch ports

see http://www.eeye.com/html/Products/Iris/Download.html  this will sniff and decode anything
telnet traffic, Email traffic - even what web pages particular clients are using.
this is legal though it could be abused - above all, if your going to use this product in a work enviroment you need to inform your employees before you deploy it, as it has certain privicy implications.

Pete
0
 

Author Comment

by:kamal73
ID: 11781758
I'm only going to use it on a Lab network, how can one tell if it is being used on their network ?
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 11781806
:) well you cant, hence the need to inform people :)

ThanQ
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
OfficeMate Freezes on login or does not load after login credentials are input.
This video discusses moving either the default database or any database to a new volume.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now