On Wed, Apr 29, 2009 at 9:21 AM, Lee Sharp <leesharp at hal dash pc dot org> wrote:
> rgreiner wrote:
>> Hi, does somebody know any interesting reference page explaining what
>> exactly netcut does and how? All pages I could find speak about
>> downloading netcut or anti netcut. I'm interested in neither. What I
>> would like is to know how to detect and trace someone using that thing
>> in my network, so I could properly "deal" whith this individual.
> addresses, they are probably arp poisoning. (Or a bridge, wireless range
> extender, or something else that is supposed to arp for others)
> single system, but not a network.
It can't, that's a popular misconception of nearly everyone who wants
something like this from my experience - it can protect the system
it's running on, but does nothing for the rest of your network. The
proper way to handle L2 mischief is to configure your switches
appropriately so it can't happen. There may be some value in running
it on the firewall for the WAN side where you normally can't control
things. I haven't looked at this solution in particular in any depth
so I'm not sure if it really provides any value.