Michael Cohen wrote:
> 
> How does one go upon "penetrating" the internal VLAN on a switch while only
> having access to the external VLAN and not traversing the PIX in the
middle?
> I have heard the response from numerous security engineers that anything is
> possible however I guess I'm a novice because I have never seen nor heard
of
> this being done in the situation mentioned above.  I attribute the idea of
> physically seperating these networks (even though VLAN based seperation is
> just as effective) as security paranoia.  

They say you have to do is flood the switch with ARP requests and 
overflow the CAM table...  easy to talk about, hard to do in practice.  
There are, however, some tools that suppose to help you attack a 
switch.  macof, part of dsniff, comes to mind.  As does ettercap.

In fact, I've never seen VLAN's mentioned as anything more than a handy
way to break up broadcast domains.  I don't consider them a security
feature, and I don't know anyone else who does either.  

Some decent reads:

http://mlarchive.ima.com/firewalls/1999/4507.html
http://packetstorm.securify.com/9909-exploits/vlan_security.txt




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=3712&t=3666
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to