|
|
And how does this work exactly?
I see it can work fine for a *local* machine. It just overrides the request. But how would this work for a machine not on the same subnet? Even then, the spoofer needs to get access to the victims streams. In a switched or completely routed network (no hub) how is this possible? Anyone?
It works like this...
I got hired by an ISP about 4 months ago and are undergoing training, i;ve been using macs ll my life and sarted to play with *nix when i installed OSX PB. Now taking into account that i've only been doing DNS stuff for abou 2 months i could set up an new DNS subdomain and dirvert for a false ASU page. This does require root access to at least the primary name server. i'm not good enough with any *nix to do this. Also remember the closet you get to the / dir in the DNS chain the more wide spread this would be. now if i can do this with only 2 months basic traingin on how NS works how easy would it be for some one who as been playing with *nix for years. If your going to reply to this saying how much moe sucure NT is to access (not that i would think so conidereing this is a mac only site) don't even bother, there is no way you could pull an argument off with that. |
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.10 seconds |
|