Home page logo
/

nanog logo nanog mailing list archives

Re: 0day Windows Network Interception Configuration Vulnerability
From: Mikael Abrahamsson <swmike () swm pp se>
Date: Mon, 4 Apr 2011 19:46:32 +0200 (CEST)

On Mon, 4 Apr 2011, Jeroen van Ingen wrote:

a network yet. I believe this attack will work on most networks out there, simply because IPv6 is enabled on hosts and rogue RA filtering hasn't been implemented on most switches yet.

Any responsible ISP will block this kind of L2 "unknown" traffic between customers.

We see this happening unwittingly in the wild as of several years ago with Windows ICS announcing RA to both WAN and LAN because it (or thinks it) has 6to4 connectivity and wants to share it.

Nothing new here, but the wider it's known the better.

--
Mikael Abrahamsson    email: swmike () swm pp se


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]