Your browser failed to load CSS style sheets. Your browser or web proxy might not support elliptic-curve TLS

Building network automation solutions

9 module online course

Start now!
back to overview

Interesting links | 2008-11-08

As always, Jeremy Stretch posted several interesting articles: how to hijack HSRP, introduction to split horizon in distance vector routing protocols and (long needed) default redistribution metrics.

Petr Lapukhov started playing with HTTP URL regular expressions within NBAR and documented his findings. The most interesting is the last Q/A pair: can I use NBAR as a content filtering engine?

And last but definitely not least, if you’re worried what will happen to WPA2 now that WPA has been cracked, Robert Graham explains the fundamental differences between WPA and WPA2. Also, make sure you read the detailed explanation of the WPA flaw to understand its implications.

Please read our Blog Commenting Policy before writing a comment.


  1. Considering WPA, it's nice but get back a second in reality. The attack only works in AP=>host direction. The researchers presumeds some IP fields so for an *unique frame*, attack have only to calculate 15 bytes. Clearly, the attack actually works with 1 byte per minute (aka 900 seconds or 15 minutes to attack a unique frame). Still a lot to work on.. mada mada dane


  2. I know they can't do much (yet), therefore I've posted the second link to a reasonable in-depth analysis. However, even with what they can do it's possible to poison ARP or DNS cache, which is all it takes sometimes to start a MITM attack.


Constructive courteous comments are most welcome. Anonymous trolling will be removed with prejudice.