







































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Common Layer 2 attacks, including MAC Address Flooding and DHCP Snooping. It explains how these attacks work and provides solutions to mitigate them, such as enabling Port Security and DHCP Snooping. The document also covers the operation of Content Addressable Memory (CAM) tables and the impact of these attacks on them.
What you will learn
Typology: Exercises
1 / 47
This page cannot be seen from the preview
Don't miss anything!
Source : http://vapenik.s.cnl.sk/pcsiete/CCNA4/05_Network_ Security_and_Monitoring.pdf. https://drive.google.com/drive/folders/1aXNR1Zfr dZcZOTVPoiVaWYOnlgqaZt
0000.0cXX.XXXX First 24 bits = Manufacture Code Assigned by IEEE XXXX.XX00. Second 24 bits = Specific Interface, Assigned by Manufacture FFFF.FFFF.FFFF All F’s = Broadcast 48 Bit Hexadecimal (Base16) Unique Layer Two Address
Source: https://meetings.apnic.net/29/pdf/Layer- 2 - Attacks-and-Mitigation-Techniques-Tutorial_Yusuf-Bhaiji.pdf
Intruder runs macof to begin sending bogus MAC addresses. MAC UMAC VMAC XMAC TMAC SMAC YMAC Z Bogus MAC addresses are added to the CAM table which eventually becomes full. Port MAC VLAN Fa0/25 T^1 Fa0/25 U 1 Fa0/25 V 1 Fa0/25 X 1 Fa0/25 Y^1 Fa0/25 Z^1 Fa0/25 … 1 Legitimate frames going to server 2 and 4 are now flooded out all ports including Fa 0 / 25. Flood The intruder now sees frames intended for server 2 and 4. Macof can flood a switch with up to 8 , 000 bogus frames per second; creating a CAM table overflow attack in a matter of a few seconds. Solution: Port Security Source: https://drive.google.com/drive/folders/1aXNR1Zfr44dZcZOTVPoiVaWYOnlgqaZt
Source : http://vapenik.s.cnl.sk/pcsiete/CCNA4/05_Network_Security_and_Monitoring.pdf
Source: https://drive.google.com/drive/folders/1aXNR1Zfr44dZcZOTVPoiVaWYOnlgqaZt http://vapenik.s.cnl.sk/pcsiete/CCNA4/05_Network_Security_and_Monitoring.pdf
DHCPREQUEST Broadcast DHCPDISCOVER Broadcast DHCPOFFER Unicast DHCPACK Unicast IP address: 192.168.10. Subnet mask: 255.255.255. Default Gateway: 192.168.10. Lease time: 3 days Two types of DHCP attacks are:
Rogue DHCP Server
DHCP Server Attacker Connects Rogue DHCP Server DHCP Client Client Broadcasts DHCP Discovery Messages DHCP Discover DHCP Discover DHCP Discover DHCP Discover DHCP Discover DHCP Discover Source : https://drive.google.com/drive/folders/1aXNR1Zfr44dZcZOTVPoiVaWYOnlgqaZt
Rogue DHCP Server
DHCP Client DHCP Server Client Accepts Rogue DHCP Offer DHCP Request DHCP Request Request DHCP DHCP Request DHCP Request DHCP Request Source : https://drive.google.com/drive/folders/1aXNR1Zfr44dZcZOTVPoiVaWYOnlgqaZt
Rogue DHCP Server
DHCP Client DHCP Server DHCP Ack DHCP Ack DHCP Ack