Penetration Testing mailing list archives
R: Layer 2 Trace
From: "Massimo Baschieri" <massimo.baschieri () re-ti it>
Date: Wed, 7 Dec 2005 06:45:18 +0100
Could it be cammer.pl? Never had luck with it, maybe a problem with snmp variables in my switches, if someone tells us how to make it work... Bye, Max -----Messaggio originale----- Da: James [mailto:jimbob.coffey () gmail com] Inviato: martedì 6 dicembre 2005 0.53 A: riftman Cc: pen-test () securityfocus com Oggetto: Re: Layer 2 Trace On 12/2/05, riftman <riftman () gmail com> wrote:
Hello, I would like to know if it is possible to do like a traceroute but on layer 2.
Well yes and no it depends somewhat on your kit and if you have admin access to all the devices in the path. If you are the admin of the network then HPOV now allows you to map the L2 and between 2 devices. It does this by looking in the cam and arp tables (via snmp) Also a few years back I did see a perl script to do this as well by logging into each device and deducing the same information. I think it also had some pretty icons if that rocks your boat. Now if I could just remember the name ... -- James ---------------------------------------------------------------------------- -- Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 ---------------------------------------------------------------------------- --- ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- Layer 2 Trace riftman (Dec 02)
- Re: Layer 2 Trace James Eaton-Lee (Dec 03)
- Re: Layer 2 Trace Gary E. Miller (Dec 04)
- Re: Layer 2 Trace James Eaton-Lee (Dec 04)
- Re: Layer 2 Trace Gary E. Miller (Dec 04)
- Re: Layer 2 Trace Carles Fragoso i Mariscal (Dec 03)
- Re: Layer 2 Trace Francois Labreque (Dec 03)
- Re: Layer 2 Trace James (Dec 05)
- R: Layer 2 Trace Massimo Baschieri (Dec 06)
- Re: R: Layer 2 Trace James (Dec 27)
- Re: R: Layer 2 Trace Maciek Dudek (Dec 28)
- R: Layer 2 Trace Massimo Baschieri (Dec 06)
- Re: Layer 2 Trace James Eaton-Lee (Dec 03)
- <Possible follow-ups>
- RE: Layer 2 Trace Dario Ciccarone (dciccaro) (Dec 03)
- Re: Layer 2 Trace riftman (Dec 03)
- Re: Layer 2 Trace Cedric Blancher (Dec 04)
- RE: Layer 2 Trace Kyle Quest (Dec 05)