Penetration Testing mailing list archives

Re: Layer 2 Trace


From: Cedric Blancher <blancher () cartel-securite fr>
Date: Sat, 03 Dec 2005 18:21:34 +0100

Le vendredi 02 décembre 2005 à 17:38 +0000, riftman a écrit :
The idea was trying to discover switches/bridges/translational bridges
which would be transparent to your L3 traceroute.

Thing is L3 traceroute relies on IP implementing error signaling using
ICMP. L2 does not implement such a service, therefore generic L2
traceroute should be imho very difficult to achieve.

But, if you are facing specific hardware, you can try to discover L2
devices through specific tools and features (see Cisco tool mentionned
before), layer 2 discovery protocols such as CDP or analysing specific
layer 2 signaling protocols (STP, VTP, etc.) if you can access them.


-- 
http://sid.rstack.org/
PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE
Hi! I'm your friendly neighbourhood signature virus.
Copy me to your signature file and help me spread!

------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:

Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------


Current thread: