lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 17 Dec 2009 01:50:15 -0800
From: Jeff Blaum <>
Subject: Re: (no subject)

Wow, is you're site still down Dan? </omfg>

"Dan Kaminsky" <> wrote:

> Easily the best environment for packet manipulation is scapy.
> The most guaranteed to work approach involves putting a system with two
> interfaces in as an attacker, and running two scapy processes that copy
> received on one interface onto the other one.  Of course, your copier
> the frames, changes what needs to be changed, fixes up checksums, etc.
> There are other approaches that are preferable for all sorts of reasons,
> the above means you don't need to fight with ARP or addresses or firewall
> rules or the kernel.  (Proxy ARP, mangle tables, yadda yadda yadda.)

Content of type "text/html" skipped

Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia -

Powered by blists - more mailing lists