On Mon, 2005-05-02 at 11:36 -0700, Brian Chrisman wrote: > > There was also a question about how someone can get ethernet > packets from a switch which aren't destined for them. > One answer was to flood the switch with arp packets using random > MAC addresses.. on most switches that (at least used to) blow > out the cache and convert the switch to an effective hub. > Seems like the type of thing you'd only be aware of if you've > actually been under such an attack and were responsible for > stopping it.
This is arp cache poisoning. I believe ettercap has a plug-in that will do this for you to aid in performing a man in the middle attack on ssh connection setups. The authenticity of host 'email-server (10.10.88.10)' can't be established. RSA key fingerprint is 82:75:5c:cd:fb:25:0f:41:52:f4:ed:5a:40:37:1e:b4. Are you sure you want to continue connecting (yes/no)? I hate seeing that message when I'm using some unknown wireless network. Am I connecting to where I think I am? > On the other hand, I don't think these were as limiting on my > friend's interview as the fact that his resume listed that he > was looking for a 'good looking girl', or perhaps something > slightly more crass but similar. So are you saying I should take "looking for a hot girl to work 'under'" off my resume? This could explain why job searches are always so hard for me. Mark -- Mark C. Ballew Reno, Nevada [EMAIL PROTECTED] http://markballew.com PGP: 0xB2A33008 AIM: pdx110
signature.asc
Description: This is a digitally signed message part
_______________________________________________ RLUG mailing list [email protected] http://lists.rlug.org/mailman/listinfo/rlug
