Dailydave mailing list archives
Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability
From: "Dobbins, Roland" <rdobbins () arbor net>
Date: Wed, 6 Apr 2011 12:02:10 +0000
On Apr 6, 2011, at 3:45 AM, Adam Behnke wrote:
The target is an IPv4 network where I would imagine it is very unlikely that these IPv6-specific countermeasures have been deployed.
These are well-known BCPs which ought to be deployed on any access network. In terms of detection/classification/traceback of such an attack, see: <http://www.ietf.org/rfc/rfc3954.txt> No one disputes the value of your hard work in demonstrating a practical implementation of such an attack. The real issue is the overhyping of this practical implementation as a '0day', when it clearly is not one. ----------------------------------------------------------------------- Roland Dobbins <rdobbins () arbor net> // <http://www.arbornetworks.com> The basis of optimism is sheer terror. -- Oscar Wilde _______________________________________________ Dailydave mailing list Dailydave () lists immunityinc com https://lists.immunityinc.com/mailman/listinfo/dailydave
Current thread:
- SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Adam Behnke (Apr 04)
- Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Nate Lawson (Apr 05)
- Message not available
- Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Adam Behnke (Apr 06)
- Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Dobbins, Roland (Apr 08)
- Re: SLAAC Attack - 0day Windows Network Interception Configuration Vulnerability Adam Behnke (Apr 06)