[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-disclosure] (no subject)
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: Re: [Full-disclosure] (no subject)
- From: Jeff Blaum <jblaum02@xxxxxxxxx>
- Date: Thu, 17 Dec 2009 01:50:15 -0800
Wow, is you're site still down Dan? </omfg>
"Dan Kaminsky" <dan@xxxxxxxxxxx> wrote:
> Easily the best environment for packet manipulation is scapy.
>
> The most guaranteed to work approach involves putting a system with two
> interfaces in as an attacker, and running two scapy processes that copy
frames
> received on one interface onto the other one. Of course, your copier
parses
> the frames, changes what needs to be changed, fixes up checksums, etc.
>
> There are other approaches that are preferable for all sorts of reasons,
but
> the above means you don't need to fight with ARP or addresses or firewall
> rules or the kernel. (Proxy ARP, mangle tables, yadda yadda yadda.)
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/