tag:blogger.com,1999:blog-343942367941320523.post1245677336263518284..comments2023-11-17T01:45:51.339+02:00Comments on Alexander Korznikov. A bit of security.: Attack Flow Diagramnopernikhttp://www.blogger.com/profile/11549169563852115328noreply@blogger.comBlogger4125tag:blogger.com,1999:blog-343942367941320523.post-30146754647497170812017-03-21T11:05:32.356+02:002017-03-21T11:05:32.356+02:00nice.
like it.nice.<br />like it.Skepperhttps://www.blogger.com/profile/10333312436067429728noreply@blogger.comtag:blogger.com,1999:blog-343942367941320523.post-62826331582583323022016-09-30T23:59:48.491+03:002016-09-30T23:59:48.491+03:00Would love to see Dnucna suggestions incorporated....Would love to see Dnucna suggestions incorporated. Additionally I have never heard of printer attacks with driver injection. Can you do a post on that?Anonymoushttps://www.blogger.com/profile/00283662931880188821noreply@blogger.comtag:blogger.com,1999:blog-343942367941320523.post-23375021652264340252016-08-15T12:52:31.302+03:002016-08-15T12:52:31.302+03:00This comment has been removed by a blog administrator.Anonymoushttps://www.blogger.com/profile/13710423502046971644noreply@blogger.comtag:blogger.com,1999:blog-343942367941320523.post-46828548132566878512016-08-05T00:01:34.612+03:002016-08-05T00:01:34.612+03:00Some other ideas:
-DHCP snooping
-PXE -> defaul...Some other ideas:<br />-DHCP snooping<br />-PXE -> default local admin and some other stuff<br />-MAC flooding to transform a switch into a hub<br />-Yersinia (CDP attack, ...)<br />-VoIP Hopper to change VLAN<br />-DNS spoofing<br />-WPAD<br />-ICMP redirect<br />(some IPv6 attacks to become router)<br /><br />There was a time when it was possible to mitm RDP (with Cain).<br />There are some PoCs of mitm of SQL protocols (SQL Server and PostgreSQL)<br />PWN Printers & get the account used to copy the scan on a network shareDnucnahttps://www.blogger.com/profile/16983598661528438026noreply@blogger.com