Chap3-1 Flashcards
Physical Layer attacks- Cut cable & barrier to radio waves It is called ……….. and it affects ……………
It is called disconnection
It affects Availability
Physical Layer attack- Tapping on wire/cable It is called ………… and it affects ………
It is called Eavesdropping,
It affects Confidentiality
Physical Layer attack - Interference and Jamming like …….. it affects ………….
Provide 120 v ac in a cable to cause damage
Availability
Physical Layer attack - Interception like ……….. it affects ……………….
Splice a cable with attacker in between, Can change messages
Integrity
How we can Attack CSMA/Cd and what it will result in nd what it affects
Keep transmitting Brute force;
Denial of service
Affects Availability
CAM Table
Content addressable Memory
CAM table stores information such …………..
MAC address
All CAM tables have fixed size
TRUE
MAC Flooding Attack
MACOF tool keep sending random source MAC and IP address, this will lead to flooding the CAM table
Macof is a tool that can flood a switch with a lot of mac addresses
TRUE
Countermeasures for MAC Flooding
Attack
1-) Port Security, Allows you to specify MAC addresses for each port , upoon detection of invalid MAC block it 2-) SMART CAM table Active hosts never get overwritten Time our inactive entries 3-) Speak first Require host to send traffic first
MAC address spoofing
Tools to change MAC address like SMAC on windows
DHCP
Dynamic Host Configuration Protocol is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP
DHCP Function
Dynamically assigns IP addresses and configuration information on demand
DHCP attack (tool is called DHCPx / Gobbler)
Tool looks at entire DHCP and tries to lease all DHCP addresses
It is called Denial of Service
Countermeasures for DHCP attack
Restrict number of MAC addresses on a port
Will not able to lease more IP addresses than MAC addresses
What can attacker do if he is the DHCP server
He can send wrong configuration like himself as default gateway
DHCP snooping
It is like a firewall between untrusted hosts and trusted DHCP servers
e
e
DHCP Man-in-the-Middle Attack
Spoofing MAC addresses where attacker can obtain all MAC
Block other machines from gettting on Network
Set up a fake DHCP server and set default gateway to attacker IP
Countermeasures for DHCP MIM
Authentication of the remote system
ARP - Address Resolution Protocol
Map IP address to MAC address
ARP- Attacks
ARP cache poisoning
Replace entries with your own entries which will lead to session hijacking, man in the middle attacks, Denial of sercvice
ARP attack tool example is ettercap
TRUE