
Any sniffer attempting to monitor traffic over a VPN will only see data that has been scrambled, making it useless to the hacker.
Rely on a trusted VPN connection: When accessing the internet remotely, always use a trusted Virtual Private Network that encrypts the connection and masks all data from sniffers. Avoiding such networks is a wise security choice unless the user is accessing an encrypted VPN. Hackers can easily sniff the entire network, gaining access to sensitive data. Do not use public Wi-Fi networks: Wi-Fi networks found in public spaces typically lack security protocols to fully protect users. The following defenses can reduce the risk of exposure to hackers: There are several steps organizations can take to protect their networks from illicit sniffing activities. That's my guess, at least, sorry for the non-confidence inspiring lack of technical details.Ĭould you deploy a fresh Debian install (only needs 80 megs or so), and run chkrootkit against it? I'd guess you'd get the same result.How to protect networks from illicit sniffers Basically, dhclient needs to accept any traffic, because it runs before the interface has an IP.
Chris dhclient does set some socket options which chkrootkit might detect as sniffing. Googling turned up similar results as yours for Slackware, and some other distros… That's my guess, at least, sorry for the non-confidence inspiring lack of technical details.Ĭould you deploy a fresh Debian install (only needs 80 megs or so), and run chkrootkit against it? I'd guess you'd get the same result. Description dhclient does set some socket options which chkrootkit might detect as sniffing.