lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8272fdf80912170150k1cd91b6ag51f77336c4d6b8d8@mail.gmail.com>
Date: Thu, 17 Dec 2009 01:50:15 -0800
From: Jeff Blaum <jblaum02@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: (no subject)

Wow, is you're site still down Dan? </omfg>

"Dan Kaminsky" <dan@...para.com> wrote:

> Easily the best environment for packet manipulation is scapy.
>
> The most guaranteed to work approach involves putting a system with two
> interfaces in as an attacker, and running two scapy processes that copy
frames
> received on one interface onto the other one.  Of course, your copier
parses
> the frames, changes what needs to be changed, fixes up checksums, etc.
>
> There are other approaches that are preferable for all sorts of reasons,
but
> the above means you don't need to fight with ARP or addresses or firewall
> rules or the kernel.  (Proxy ARP, mangle tables, yadda yadda yadda.)

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ