Skip to main content

Timeline for Sniffing Packets for IoT devices

Current License: CC BY-SA 3.0

3 events
when toggle format what by license comment
Apr 8, 2018 at 18:28 comment added Milen I think it's a better idea to bridge the two interfaces instead of intruding on the whole network. Just connect the devices through the transparent bridge. Running ARP poisoning will be a lot more intrusive across to the rest of the devices on the network. You could also try MAC flooding the Netgear switch's CAM, that way it will start acting as a hub. Better than ARP poisoning IMHO, however works if there are no port restrictions/protection on the device.
Apr 8, 2018 at 15:01 comment added hemlock While this would work, unless I am misunderstanding your suggestion this solution it would pretty intrusive to the rest of my network. I would have to go through and put in all my static DHCP address and whatnot onto the new DHCP server instead of my router. Either that or I would have to segregate off the devices I want to sniff onto another network. Ideally, I would like to only target the specific IoT devices and not interfere with anything else.
Apr 8, 2018 at 14:43 history answered MTG CC BY-SA 3.0