博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Killing the Monkey in the Middle
阅读量:2435 次
发布时间:2019-05-10

本文共 1475 字,大约阅读时间需要 4 分钟。

There are many ways for the attacker to insert themselves in the middle of a conversation. Just some of the tools at the attackers disposal include:

 

 

  • DNS Cache Poisoning (metasploit)
  • NETBIOS Names spoofing (nbtool at skullsecurity.org)
  • Lie about the DNS,WINS and/or default gateway with a rouge DHCP server (yersinia, ettercap)
  • deliver a WPAD file or otherwise reconfigure the browser proxy (metasploit)
  • IPv6 ISATAP spoofing
  • Attack routing protocols such as BGP MITM
  • IP source routing attacks (netcat)
  • ICMP Redirect messages (ettercap)
  • ARP Cache Poisoning (yersinia, ettercap, cain)
  • Switch Port Stealing (ettercap)
  • Layer2 Mac Flooding* (yersinia, macflood, macof)
  • Gratuitous Spanning Tree BPDU Root messages* (yersinia)
* Allows sniffing that leads to MiTM

Some of these attacks work across the internet, but most of these are limited to the LAN and rely on Layer2. The good news is that many of these attacks can be mitigated with new features deployed in the latest version of Cisco's IOS (12.2 or better). BPDU Guard, DHCP Snooping, DHCP Snooping +Dynamic Arp Inspection , DHCP Snooping + IP Source Guard, ARP Rate Limiting, Mac Address port security, PVLAN Protected, Isolated, Community and Promiscuous ports and 802.1x can all be used to effectively limit many of these attacks. Listener Brian Almond (Infosec Samurai) submitted this PDF on layer two security. Give it a gander! Nice work Brian.

 

Other resources

 

Mark Baggett is teaching SANS 504 in Raleigh NC June 21st!

转载地址:http://etqmb.baihongyu.com/

你可能感兴趣的文章
一年的测试生活和感悟
查看>>
黑盒测试
查看>>
没有需求就没有软件——需求工程简论
查看>>
使用PHP开发SCA和SDO
查看>>
通过RUP用例进行需求管理的可追踪性策略(2)
查看>>
持续改进之配置管理变更的关键路径
查看>>
SCA客户端以及基于Java的模型实现(四)
查看>>
ora2pg 字符集 转换问题总结
查看>>
postgresql 优化与维护
查看>>
mongodb replica sets 测试
查看>>
linux AS6.2 与 as5.4 的对比,性能提升明显
查看>>
FLASHCACHE 的是是非非
查看>>
length() between oracle and postgresql
查看>>
求无序数组总第n大的数
查看>>
99-lisp lisp 的99个问题 P1-10
查看>>
PG 函数的易变性(Function Volatility Categories)
查看>>
Lisp Quote 和Backquote分析
查看>>
PG psql 变彩色显示
查看>>
SICP 练习 1.3
查看>>
pg 数据库HA 启动脚本的两个假设
查看>>