Dailydave mailing list archives
Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability
From: "Adam Behnke" <adam () infosecinstitute com>
Date: Tue, 5 Apr 2011 15:45:40 -0500
I think that the point most people are missing is that the target of the attack isn't an IPv6 network - these can be defended with RA Guard, switch ACLs, etc, all the good stuff from the cited(!) RFC 6104. The target is an IPv4 network where I would imagine it is very unlikely that these IPv6-specific countermeasures have been deployed. Johannes Ullrich was one of those who "got it" : https://twitter.com/#!/johullrich/status/55096958074884096 _______________________________________________ Dailydave mailing list Dailydave () lists immunityinc com https://lists.immunityinc.com/mailman/listinfo/dailydave
Current thread:
- SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Adam Behnke (Apr 04)
- Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Nate Lawson (Apr 05)
- Message not available
- Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Adam Behnke (Apr 06)
- Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Dobbins, Roland (Apr 08)
- Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Adam Behnke (Apr 06)