Vulnerability Development mailing list archives

Re: trusted solaris pen testing


From: Valdis.Kletnieks () vt edu
Date: Mon, 06 Dec 2004 17:20:32 -0500

On Sun, 05 Dec 2004 11:32:01 EST, Jack said:
There are two possibilities: either find out the trusted hosts, and take 
their IP (DoS that box first) or go for the spoofing idea.

Spoofing is hard, especially on a switched network. I currently don't 
know of any pre-written source that does this well. (I'm currently in 
the process of writing my own). So, if you would like to undertake this, 
you will probably need to write your own code.

http://ettercap.sourceforge.net/

?

Attachment: _bin
Description:


Current thread: