RE: https://infosec.exchange/@dangoodin/116137739187152802
Well this will be fun to look at.
I don’t agree with trying to use a VPN as a mitigation for this though.
RE: https://infosec.exchange/@dangoodin/116137739187152802
Well this will be fun to look at.
I don’t agree with trying to use a VPN as a mitigation for this though.
https://www.ndss-symposium.org/wp-content/uploads/2026-f1282-paper.pdf
Here is the link to the paper.
(First read: I haven’t done testing)
Spoof the MAC of the gateway to then attack higher layers. Nice.
Looks like useful way to also possibly become the authoritative DHCP server where you can then configure the normal DHCP settings: DNS, IP addresses, next hop, and of course DHCP Option 121 routes.
That of course assuming there’s not some other thing that would prevent it.
Might be time to dust off this library from the old TunnelVision days:
https://github.com/superit23/arcanetrickster