![]() ![]() ![]() Many thanks to Chrissy from netnerds, who set me on the right track with her post about NAT on OS X □ sudo ifconfig bridge0 deletem en0 deletem en3.It works! Now we can sniff away with tcpdump or wireshark for example, and are sure that no packet is going to escape us… sudo ifconfig bridge0 addm en0 addm en3.sudo ifconfig en3 up // bring up the USB/Thunderbolt adapter, or it won’t work!.ifconfig // to find out which interface is which.grab one of those USB or Thunderbolt Ethernet Adapters.There’s got to be a way to bridge two ethernet interfaces, connect myself to the network and let the printer talk to the world through my laptop? You betcha! Is it a portable laptop like mine? Does it have any flavor of Unix or Linux on it? Well, so does mine, in this case Apple OS X (10.8.2). Ok, now I could start arp spoofing the printer, but was too lazy to do that, besides: we have intrusion prevention up and running… So far so good, usually you could use a hub (still got one around? neither do I), or for example a switch with a monitoring or promiscuous port (not available? Welcome to the club!). So, one of our domain printers was acting up and the printer department wanted me to sniff all the packets to and from the printer.
0 Comments
Leave a Reply. |