That would be a layer 7 to layer 3 link switcheroo.Īrp spoofing is a similar concept but instead of names to IPs, we modify the IP(layer 3) to MAC(layer 2) relationship. ![]() ![]() At no additional charge, after capturing all the packets, they will kindly forward them on the the real prod_database. That person modifies the record for “prod_” to point to their IP address. ![]() Consider someone has hijacked your DNS server.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |