Sunday, October 24, 2004

Spanning Tree Vulnerability

Here's a quick discussion, with a sample exploit, of one of the problems with the Spanning Tree Protocol. The exploit requires physical access to the switches (or least two network segments from different ports). It is reason enough to use port security and lock your wiring closets though.

No comments:

Post a Comment