Home page logo
/
Zenmap screenshot
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Example Nmap output

File sniffer-detect

Script types: hostrule
Categories: discovery, intrusive
Download: http://nmap.org/svn/scripts/sniffer-detect.nse

User Summary

Checks if a target on a local Ethernet has its network card in promiscuous mode.

The techniques used are described at http://www.securityfriday.com/promiscuous_detection_01.pdf.

Example Usage

nmap -sV --script=sniffer-detect <target>

Script Output

Host script results:
|_ sniffer-detect: Likely in promiscuous mode (tests: "11111111")

Requires


Author: Marek Majkowski

License: Same as Nmap--See http://nmap.org/book/man-legal.html

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]