Ferret works on the concept of “data seepage”: bits of benign data that people willingly broadcast to the world (as opposed to “leakage”, which is data people want to hide from the world).
Examples of data seepage are what happens when you power-on your computer. It will broadcast to the world the list of WiFi access-points you’ve got cached on your computer, the previous IP address you used (requested by DHCP), your NetBIOS name, your login ID, and a list of servers (via NetBIOS request) you want connections to.
Even if you then establish a VPN connection to hide everything else, you’ve already broadcasted this information to everyone on the local network.
The FERRET tool gathers this broadcasted information and correlates it. It demonstrates how much you expose to hackers.
The latest version of the Data Seepage detection tool, Ferret, is available for download. It is still in a rough form but compiles cleanly on Linux and Windows. A number of bug fixes have been introduced as well as new functionality.
You can download the Blackhat slides here:
Get Ferret 1.1 here:
Or read more here.