this is my first english blog entry. Excuse me for my hopefully not so bad english 🙂
During my reverse engeneering on the Terratec Noxon 2 Audio (read the past two blog posts) i had to sniff the network traffic between the Noxon and the Internet.
First i just sniffed the wireless traffic with a simple ARP spoofing attack in my switched network.
But i couldn’t be sure wheather I sniffed the whole traffic or if I just missed some „intranet“ traffic in my net.
After some internet research, i decided to build my own passive ethernet tap to do a MITM (man in the middle) attack.