How danger this attack could be? is it just exploitable only at layer 2 or again Top 10 vulnerabilities can be exploited using same attack?
Interestingly, there can be a massive spoofing at layer 2 which can direct all webserver related incoming / outgoing requests to users via an attackers system and there is a possibility of reading / manipulating those responses and thus exploitation of any vulnerabilities which exists in web. Yes all the top ten vulnerabilities. But this can be possible only within the network ( the local network ). Lets do further research to see if this can also have impact from public network like internet.... Regards Sandeep Thakur -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
