Penetration Testing mailing list archives
Re: Re: MITM Proxies
From: shll2 () yahoo com
Date: 31 Jan 2006 00:47:16 -0000
You could have a MITM implemented not with a Proxy but by using another technique, for example with ARP spoof in a switches network and using a special interceptor like ETTERCAP (http://ettercap.sourceforge.net). Take a look on it! Its an impressive tools for these purposes. Regards ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
Current thread:
- Re: Re: MITM Proxies shll2 (Feb 04)