Vulnerability Development mailing list archives
Re: hijacking TCP connections on FreeBSD
From: "Secterm ." <securityterminal () hotmail com>
Date: Wed, 10 Jul 2002 16:28:58 -0600
a man in the middle is not neccessary, you sniff the packets, spoof your ip and or mac, then dos the other box you are spoofing. there is a *nix tool that will do an arp flood, turning all switches into a hub, so you do not need to be on the same subnet either. search for it on freshmeat.net Jmiller
Did you mean MAC Flooding instead of Arp Flooding? This will allow you to DoS switches and they usually revert to a hub-like mode. If so you can use dsniff's macof to do just this.
-Secterm. _________________________________________________________________ Send and receive Hotmail on your mobile device: http://mobile.msn.com
Current thread:
- Re: hijacking TCP connections on FreeBSD, (continued)
- Re: hijacking TCP connections on FreeBSD jmiller (Jul 10)
- Re: hijacking TCP connections on FreeBSD martin f krafft (Jul 10)
- Re: hijacking TCP connections on FreeBSD Andreas Krennmair (Jul 10)
- Re: hijacking TCP connections on FreeBSD Ron DuFresne (Jul 10)
- Re: hijacking TCP connections on FreeBSD jmiller (Jul 10)
- Re: hijacking TCP connections on FreeBSD tide (Jul 09)
- Re: hijacking TCP connections on FreeBSD Joerg Over (Jul 09)
- Re: hijacking TCP connections on FreeBSD Bojan Zdrnja (Jul 10)
- Re: hijacking TCP connections on FreeBSD ALoR (Jul 09)
- Re: hijacking TCP connections on FreeBSD Craig (Jul 09)
- RE: hijacking TCP connections on FreeBSD Cushing, David (Jul 09)
- Re: hijacking TCP connections on FreeBSD Secterm . (Jul 10)