[10389] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Link-layer security flaws

daemon@ATHENA.MIT.EDU (Illuminatus Primus)
Thu Apr 29 14:52:12 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id: <19990429125033.O269@oto.valueweb.net>
Date: 	Thu, 29 Apr 1999 12:50:33 -0400
Reply-To: Illuminatus Primus <vermont@GATE.NET>
From: Illuminatus Primus <vermont@GATE.NET>
X-To:         Otel Florian-Daniel <otel@ce.chalmers.se>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <14118.52204.410695.76345@cepc30.ce.chalmers.se>; from Otel
              Florian-Daniel on Wed, Apr 28, 1999 at 11:34:59AM +0200

PPP's escape character is '~', and any occurences of this character
must be escaped.  So, to double the effectiveness of a ping flood,
pings can be filled with a tilde.  DoS

+----[ On Wed, Apr 28, at 11:34AM(+0200), Otel Florian-Daniel wrote: ]--------------
| Hello everybody,
|
| I'm trying to gather some data about link-layer protocol specific attacks
| and/or security flaws that can be exploited, e.g. Ethernet is prone to
| sniffing and MAC address spoofing. Most of the stuff I found so far
| revolves around Eth. sniffing (how to use it, how to detect it, so
| on and so forth). But what about other types of attacks and/or
| link-layers (e.g. broadcast-storm based DoS attack? Are Token Ring, FDDI,
| ISDN, ATM flawless ?)  Does anybody have some info about this ? Is the
| topic superfluous/too general ?
|
| Many thanks in advance for any reasonable comment and/or pointers,
|
|
| Florian
|
| P.S: Maybe is worth stressing more that I'm looking for vendor and
| protocol independent info and not specific implementation bugs.
+----[ End Quote ]---------------------------

home help back first fref pref prev next nref lref last post