I teach various layer 2 attacks in my TCP/IP Weapons School class.  Sometimes I wonder if students are thinking "That is so old!  Who does that anymore?"  In response I mention last year's Freenode incident where Ettercap was used in an ARP spoofing attack.  
Thanks to Robert Hensing's pointer to Neil Carpenter's post, I have another documented ARP spoofing attack.  Here a malicious IFRAME is injected into traffic by ARP spoofing a gateway.  We cover that in my Black Hat class, both of which are now officially full.
Please remember that TCP/IP Weapons School is a traffic analysis class.  I believe I cover the most complicated network traces presented in any similar forum.  All you need to get the most out of the class is a laptop running a recent version of Wireshark.  The class is not about demonstrating tools or having students run tools.  Other classes do a better job with that sort of requirement.  The purpose of this class is to become a better network security analyst by deeply understanding how certain network-based attacks work.  I provide all of the information needed to replicate the attack if so desired, but that is not my goal.
Jumat, 06 Juli 2007
ARP Spoofing in Real Life
Langganan:
Posting Komentar (Atom)






 
 
 
 
 
0 komentar:
Posting Komentar