Apologies. I just clarified this with one of our engineers. In the 
process of identifying the issue our engineers performed packet dumps at 
various locations within our network. In one of the packet dumps 65% of 
the packets that were captured were ARP requests. So, whether what our 
engineer said as unclear, or I simply misunderstood him; either way 
there was a miscommunication, and I sincerely apologize for that. I did 
confirm again that the target was a Chase-owned IP address, but figuring 
out the details of what was being attacked wasn't our focus. We simply 
wanted to stop it.

Warm Regards,
Jordan Michaels

On 01/29/2014 12:49 AM, Jochem van Dieten wrote:
>
> On Wed, Jan 29, 2014 at 2:28 AM, Russ Michaels wrote:
>
>> perhaps this will help.
>> http://www.watchguard.com/infocenter/editorial/135324.asp
>
>
> That is the traditional ARP attack in which the request is broadcasted and
> the reply has the IP address. That has the consequence of redirecting
> normal, local traffic to the spoofed address.
> That does nothing to explain how you flood ARP requests to an IP address.
> ARP runs on ethernet, not on IP, so it can not have an IP address as a
> destination, only an ethernet address.
>
> Jochem
>

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:357521
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to