Penetration Testing mailing list archives
Mac spoofing using libnet
From: preceptor () hushmail com
Date: Fri, 22 Mar 2002 05:12:26 -0800
I'm currently looking at a system which seems to avoid using ARP to resolve a mac address. Instead, it's looking at the mac address embedded in the packet. I was wondering, if there are any tools built around Libnet (or similar) which are able to handle a whole tcp/IP session. (nemesis is the sort of idea, but unfortunately the test I'm looking at is an HTTP request, which is a little challenging using nemesis). Alternatively, I was looking at having two NICs with different mac addresses, duplicate IP addresses, and network cables such that one of the interfaces is send only. Can anyone point me at such a tool? (or an example of libnet used to do a whole session). I'm content enough to put this together, but I don't really want to re-invent the wheel if it's already been done. Cheers Ed Rolison Hush provide the worlds most secure, easy to use online applications - which solution is right for you? HushMail Secure Email http://www.hushmail.com/ HushDrive Secure Online Storage http://www.hushmail.com/hushdrive/ Hush Business - security for your Business http://www.hush.com/ Hush Enterprise - Secure Solutions for your Enterprise http://www.hush.com/ Looking for a good deal on a domain name? http://www.hush.com/partners/offers.cgi?id=domainpeople ---------------------------------------------------------------------------- This list is provided by the SecurityFocus Security Intelligence Alert (SIA) Service. For more information on SecurityFocus' SIA service which automatically alerts you to the latest security vulnerabilities please see: https://alerts.securityfocus.com/
Current thread:
- Mac spoofing using libnet preceptor (Mar 22)
- <Possible follow-ups>
- Re: Mac spoofing using libnet infos () aql fr (Mar 25)