Penetration Testing mailing list archives
RE: Layer 2 Trace
From: "Dario Ciccarone (dciccaro)" <dciccaro () cisco com>
Date: Fri, 2 Dec 2005 11:35:22 -0500
An L3 traceroute gives you a very good idea of which L2 devices are in the path between source and destination - if it does L3, has to do L2 (and L1 ;)) The question is: what are you trying to achieve? What additional information would you get from a L2 traceroute that you cannot obtain from an L3 traceroute + additional tools to identify the specific L3 device? Agreed: your packet *might be* traversing one or more switches/bridges/translational bridges which would be transparent to your L3 traceroute. Cisco does implement an L2 traceroute feature - but many preconditions have to be met. Check: http://www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/122sx/swcg/l 2trace.htm A generic L2 traceroute looks to me like a difficult thing to do. Dario
-----Original Message----- From: riftman [mailto:riftman () gmail com] Sent: Friday, December 02, 2005 6:03 AM To: pen-test () securityfocus com Subject: Layer 2 Trace Hello, I would like to know if it is possible to do like a traceroute but on layer 2. I need to see the equipment that is between source and target machines. Thanks in advance; PS: Sorry my English, this is my first post ... be kind -------------------------------------------------------------- ---------------- Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------- -----------------
------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- Layer 2 Trace riftman (Dec 02)
- Re: Layer 2 Trace James Eaton-Lee (Dec 03)
- Re: Layer 2 Trace Gary E. Miller (Dec 04)
- Re: Layer 2 Trace James Eaton-Lee (Dec 04)
- Re: Layer 2 Trace Gary E. Miller (Dec 04)
- Re: Layer 2 Trace Carles Fragoso i Mariscal (Dec 03)
- Re: Layer 2 Trace Francois Labreque (Dec 03)
- Re: Layer 2 Trace James (Dec 05)
- R: Layer 2 Trace Massimo Baschieri (Dec 06)
- Re: R: Layer 2 Trace James (Dec 27)
- Re: R: Layer 2 Trace Maciek Dudek (Dec 28)
- R: Layer 2 Trace Massimo Baschieri (Dec 06)
- Re: Layer 2 Trace James Eaton-Lee (Dec 03)
- <Possible follow-ups>
- RE: Layer 2 Trace Dario Ciccarone (dciccaro) (Dec 03)
- Re: Layer 2 Trace riftman (Dec 03)
- Re: Layer 2 Trace Cedric Blancher (Dec 04)
- RE: Layer 2 Trace Kyle Quest (Dec 05)