[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8272fdf80912170150k1cd91b6ag51f77336c4d6b8d8@mail.gmail.com>
Date: Thu, 17 Dec 2009 01:50:15 -0800
From: Jeff Blaum <jblaum02@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: (no subject)
Wow, is you're site still down Dan? </omfg>
"Dan Kaminsky" <dan@...para.com> wrote:
> Easily the best environment for packet manipulation is scapy.
>
> The most guaranteed to work approach involves putting a system with two
> interfaces in as an attacker, and running two scapy processes that copy
frames
> received on one interface onto the other one. Of course, your copier
parses
> the frames, changes what needs to be changed, fixes up checksums, etc.
>
> There are other approaches that are preferable for all sorts of reasons,
but
> the above means you don't need to fight with ARP or addresses or firewall
> rules or the kernel. (Proxy ARP, mangle tables, yadda yadda yadda.)
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists