How danger this attack could be? is it just exploitable only at layer 2 or
again Top 10 vulnerabilities can be exploited using same attack?

Interestingly, there can be a massive spoofing at layer 2 which can direct
all webserver related incoming / outgoing requests to users via an attackers
system and there is a possibility of reading / manipulating those responses
and thus exploitation of any vulnerabilities which exists in web. Yes all
the top ten vulnerabilities. But this can be possible only within the
network ( the local network ). Lets do further research to see if this can
also have impact from public network like internet....


Regards
Sandeep Thakur

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to