On Mon, 2005-05-02 at 11:36 -0700, Brian Chrisman wrote:
> 
> There was also a question about how someone can get ethernet
> packets from a switch which aren't destined for them.
> One answer was to flood the switch with arp packets using random
> MAC addresses.. on most switches that (at least used to) blow
> out the cache and convert the switch to an effective hub.
> Seems like the type of thing you'd only be aware of if you've
> actually been under such an attack and were responsible for
> stopping it.

This is arp cache poisoning. I believe ettercap has a plug-in that will
do this for you to aid in performing a man in the middle attack on ssh
connection setups. 

The authenticity of host 'email-server (10.10.88.10)' can't be established.
RSA key fingerprint is 82:75:5c:cd:fb:25:0f:41:52:f4:ed:5a:40:37:1e:b4.
Are you sure you want to continue connecting (yes/no)? 

I hate seeing that message when I'm using some unknown wireless network.
Am I connecting to where I think I am?


> On the other hand, I don't think these were as limiting on my 
> friend's interview as the fact that his resume listed that he 
> was looking for a 'good looking girl', or perhaps something
> slightly more crass but similar.

So are you saying I should take "looking for a hot girl to work 'under'"
off my resume? This could explain why job searches are always so hard
for me. 

Mark
-- 
Mark C. Ballew                          Reno, Nevada    
[EMAIL PROTECTED]                    http://markballew.com
PGP: 0xB2A33008                         AIM: pdx110

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
RLUG mailing list
[email protected]
http://lists.rlug.org/mailman/listinfo/rlug

Reply via email to