Network Attacks & Mitigations Flashcards
Man in the Middle
ARP poisoning can enable an attacker to become the man in the middle & intercept traffic
DoS
By poisoning ARP tables, an attacker can perform a DoS by creating false traffic routes
Spoofing Identity
An attacker can use ARP poisoning to hide in the network
How to prevent ARP poisoning
- Identify duplicate MAC address
- Check for Suspicious ARP traffic
- User Static ARP entries
- Configure Port security
- use encrypted protocols
Yersenia
Framework for creating network attacks
exploits network protocols vulnerabilities
comes with ready-made attacks against multiple protocols
Shutdown (default mode)
The port shuts down automatically and notification is sent
Restrict
Drops frames with unfamiliar source MAC addresses and sends a notification
Protect
frames with unknown source MAC addresses are dropped with no notification sent
Manual
Most secure method
requires manual configuration of each allowed MA per interface
Sticky
MACS are learned dynamically and limited to a maximum number per interface
(port security 1 & 3072)
VLAN Hopping
The attacker bypasses switch restrictions and intercepts traffic from various VLANs
two common methods, Switch Spoofing & Double Tagging