Penetration Testing mailing list archives
Re: [PEN-TEST] Arp Spoofing under WinNT 4.0
From: Shoten <shoten () starpower net>
Date: Wed, 31 Jan 2001 15:41:56 -0500
On unix there are many tools, but on WinNT 4.0 with WinPcap there are some tools for "arp spoofing" ?the obvious suggestion is to use your UN*X laptop/other device to flood the switch or spoof (via a hub attached to your switched port) the MAC addr you wish to impersonate.
How could this possibly work? My understanding is that he's remote, not physically local. The MAC addresses of any packets sent will, if they even get there at all, be replaced at each and every hop along the way there...
Current thread:
- [PEN-TEST] Arp Spoofing under WinNT 4.0 Fabio Pietrosanti (Jan 31)
- Re: [PEN-TEST] Arp Spoofing under WinNT 4.0 Jose Nazario (Jan 31)
- Re: [PEN-TEST] Arp Spoofing under WinNT 4.0 m (Jan 31)
- Re: [PEN-TEST] Arp Spoofing under WinNT 4.0 Shoten (Jan 31)
- <Possible follow-ups>
- Re: [PEN-TEST] Arp Spoofing under WinNT 4.0 Brentlinger, Mike (ISS eServices) (Jan 31)
- Re: [PEN-TEST] Arp Spoofing under WinNT 4.0 Jose Nazario (Jan 31)