Penetration Testing mailing list archives
Re: Layer 2 Trace
From: Francois Labreque <flabreq () ca ibm com>
Date: Fri, 2 Dec 2005 11:01:19 -0500
Short answer: No.
Long answer: traceroute uses ICMP ttl-expired messages to work - which has
no equivalent in the various layer two protocols.
The only thing similar that is possible, is with source-route-bridging on
token ring, and you will only find out which ring numbers and bridge
numbers you go through to reach your destination, not the name, mac
address or other layer three addresses of the devices in between, so if
you have access to network topology diagrams, you can figure out where
your traffic goes, but it is of little use for network topology discovery.
Besides, even in a token-ring SNA environment nowadays, everyone uses
DLSw, which masks the real path that datagrams take.
___________________________________________________
François Labrèque, CCNP
Team Leader, Network Support
IBM Global Services
Tel.:(514)-964-2150 Fax.:(514)-964-1708
flabreq () ca ibm com
In the future, performance will be measured by the size of your pipe!
- Dogbert, on networking
riftman <riftman () gmail com>
2005-12-02 06:03
To
pen-test () securityfocus com
cc
Subject
Layer 2 Trace
Hello,
I would like to know if it is possible to do like a
traceroute
but on layer 2.
I need to see the equipment that is between source and
target
machines.
Thanks in advance;
PS: Sorry my English, this is my first post ... be kind
------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:
Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers
are
futile against web application hacking. Check your website for
vulnerabilities
to SQL injection, Cross site scripting and other web attacks before
hackers do!
Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------
------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:
Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------
Current thread:
- Layer 2 Trace riftman (Dec 02)
- Re: Layer 2 Trace James Eaton-Lee (Dec 03)
- Re: Layer 2 Trace Gary E. Miller (Dec 04)
- Re: Layer 2 Trace James Eaton-Lee (Dec 04)
- Re: Layer 2 Trace Gary E. Miller (Dec 04)
- Re: Layer 2 Trace Carles Fragoso i Mariscal (Dec 03)
- Re: Layer 2 Trace Francois Labreque (Dec 03)
- Re: Layer 2 Trace James (Dec 05)
- R: Layer 2 Trace Massimo Baschieri (Dec 06)
- Re: R: Layer 2 Trace James (Dec 27)
- Re: R: Layer 2 Trace Maciek Dudek (Dec 28)
- R: Layer 2 Trace Massimo Baschieri (Dec 06)
- Re: Layer 2 Trace James Eaton-Lee (Dec 03)
- <Possible follow-ups>
- RE: Layer 2 Trace Dario Ciccarone (dciccaro) (Dec 03)
- Re: Layer 2 Trace riftman (Dec 03)
- Re: Layer 2 Trace Cedric Blancher (Dec 04)
- RE: Layer 2 Trace Kyle Quest (Dec 05)
