10.4_MAC Address Table Attack Flashcards
command used to show mac address table
show mac address-table dynamic
True or False
Traffic is flooded only within the local LAN or VLAN. The threat actor can only capture traffic within the local LAN or VLAN to which the threat actor is connected.
True
When this occurs, the switch treats the frame as an unknown unicast and begins to flood all incoming traffic out all ports on the same VLAN without referencing the MAC table. This condition now allows a threat actor to capture all of the frames sent from one host to another on the local LAN or local VLAN.
If the threat actor stops ___ from running or is discovered and stopped, the switch eventually ages out the older MAC address entries from the table and begins to act like a switch again.
macof
To mitigate MAC address table overflow attacks, network administrators must implement ___.
port security
DHCP Attacks
Two types of DHCP attacks are ____
DHCP Starvation and DHCP Spoofing
Both DHCP Starvation and DHCP Spoofing attacks are mitigated by implementing ___.
DHCP snooping
The goal of the DHCP Starvation attack is to ____.
create a DoS for connecting clients.
DHCP Starvation Attack
___ has the ability to look at the entire scope of leasable IP addresses and tries to lease them all. Specifically, it creates DHCP discovery messages with bogus MAC addresses.
Gobbler
____occurs when a rogue DHCP server is connected to the network and provides false IP configuration parameters to legitimate clients.
DHCP Spoofing Attack
DHCP Spoofing Attack
A rogue server can provide a variety of misleading information:
____: The rogue server provides an invalid gateway or the IP address of its host to create a man-in-the-middle attack. This may go entirely undetected as the intruder intercepts the data flow through the network.
Wrong default gateway
DHCP Spoofing Attack
A rogue server can provide a variety of misleading information:
____: The rogue server provides an incorrect DNS server address pointing the user to a nefarious website.
Wrong DNS server
DHCP Spoofing Attack
A rogue server can provide a variety of misleading information:
___: The rogue server provides an invalid IP address effectively creating a DoS attack on the DHCP client.
Wrong IP address
ARP ATTACKS
According to the ARP RFC, a client is allowed to send an unsolicited ARP Request called a “__.”
gratuitous ARP
When a host sends a gratuitous ARP, other hosts on the subnet store the MAC address and IPv4 address contained in the gratuitous ARP in their ARP tables
TRUE OR FALSE
The problem is that an attacker can send a gratuitous ARP message containing a spoofed MAC address to a switch, and the switch would update its MAC table accordingly.
TRUE
Therefore, any host can claim to be the owner of any IP and MAC address combination they choose. In a typical attack, a threat actor can send unsolicited ARP Replies to other hosts on the subnet with the MAC Address of the threat actor and the IPv4 address of the default gateway.
ARP spoofing and ARP poisoning are mitigated by implementing __.
DAI