CH 5BREVISED Flashcards
1
Q
MAC flooding
A
o flood the CAM
table of a switch
2
Q
OSI
A
BIT FRAME PACKET SEGMENT DATAGRAM MESSAGES
3
Q
PRIVATE IP 4
A
Class A 10.0.0.0–10.255.255.255
Class B 172.16.0.0–172.31.255.255
Class C 192.168.0.0–192.168.255.255
4
Q
PRIVATE IPV6
A
FE80::/10,
which spans addresses that start with FE80, FE90, FEA0, and FEB0.
5
Q
IPV6
A
Unicast Global unicast starts at 2000 Link-local ::1 and FE80::/10 Address assigned to one interface of one host. Anycast Structured like unicast addresses Address assigned to a group of interfaces on multiple nodes. Packets are delivered to the “first” interface only. Multicast FF00::/8 Address assigned to a group of interfaces on multiple nodes. Packets are delivered to all interfaces.
6
Q
VLAN HOOPING
A
Switch spoofing The attacking computer must be capable of speaking the tagging and trunking protocols used by the VLAN trunking switch to imitate the switch. If successful, traffic for one or more VLANs is then accessible to the attacking computer. Put unplugged ports on the switch into an unused VLAN. Configure the switch ports in charge of passing tagged frames to be trunks and to explicitly forward specific tags. Avoid using default VLAN names such as VLAN or VLAN1. Double tagging In a double-tagging attack, an attacking host attaches two VLAN tags to the frames it transmits. The first, proper header is stripped off by the first switch the frame encounters, and the frame is then forwarded. The second, false header is then visible to the second switch that the frame encounters. Upgrade firmware or software. Pick an unused VLAN as the default VLAN (also known as a native VLAN) for all trunks, and do not use it for any other intent. Consider redesigning the VLAN if multiple 802.1Q switches are used.