From: Cedric Blancher (blancher@cartel-securite.fr)
Date: Sat Dec 03 2005 - 12:21:34 EST
Le vendredi 02 décembre 2005 à 17:38 +0000, riftman a écrit :
> The idea was trying to discover switches/bridges/translational bridges
> which would be transparent to your L3 traceroute.
Thing is L3 traceroute relies on IP implementing error signaling using
ICMP. L2 does not implement such a service, therefore generic L2
traceroute should be imho very difficult to achieve.
But, if you are facing specific hardware, you can try to discover L2
devices through specific tools and features (see Cisco tool mentionned
before), layer 2 discovery protocols such as CDP or analysing specific
layer 2 signaling protocols (STP, VTP, etc.) if you can access them.
-- http://sid.rstack.org/ PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE >> Hi! I'm your friendly neighbourhood signature virus. >> Copy me to your signature file and help me spread! ------------------------------------------------------------------------------ Audit your website security with Acunetix Web Vulnerability Scanner: Hackers are concentrating their efforts on attacking applications on your website. Up to 75% of cyber attacks are launched on shopping carts, forms, login pages, dynamic content etc. Firewalls, SSL and locked-down servers are futile against web application hacking. Check your website for vulnerabilities to SQL injection, Cross site scripting and other web attacks before hackers do! Download Trial at: http://www.securityfocus.com/sponsor/pen-test_050831 -------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:13 EDT