Vulnerability Development mailing list archives
RE: trusted solaris pen testing
From: "Clemens, Dan" <Dan.Clemens () healthsouth com>
Date: Mon, 6 Dec 2004 14:39:03 -0600
There are two possibilities: either find out the trusted hosts, and take their IP (DoS that box first) or go for the spoofing idea.
>Spoofing is hard, especially on a switched network. I currently don't >know of any pre-written source that does this well. (I'm currently in >the process of writing my own). So, if you would like to undertake this, >you will probably need to write your own code. >Remember, if spoofing an IP on a switched network you will need ARP >spoofing in order to get the recieved packets. Well, don't forget when spoofing arp on a switched network to enable ip forwarding on your box. Spoofing isn't hard when you have dsniff... http://www.monkey.org/~dugsong/dsniff/ -Daniel Clemens Confidentiality Notice: This e-mail communication and any attachments may contain confidential and privileged information for the use of the designated recipients named above. If you are not the intended recipient, you are hereby notified that you have received this communication in error and that any review, disclosure, dissemination, distribution or copying of it or its contents is prohibited. If you have received this communication in error, please notify me immediately by replying to this message and deleting it from your computer. Thank you.
Current thread:
- trusted solaris pen testing Elihu Smails (Dec 02)
- Re: trusted solaris pen testing Jack (Dec 06)
- RE: trusted solaris pen testing Dom De Vitto (Dec 09)
- Re: trusted solaris pen testing Valdis . Kletnieks (Dec 09)
- Re: trusted solaris pen testing xyberpix (Dec 06)
- <Possible follow-ups>
- RE: trusted solaris pen testing Clemens, Dan (Dec 09)
- Re: trusted solaris pen testing Jack (Dec 06)