Networking Flashcards
MAC Flooding
Attempt to overwhelm the memory on a switch with MAC addresses
MAC Spoofing
When an attacker masks their own MAC address to pretend they have the MAC address of another device
Routers
Operate at layer 3 : Used to connect two or more networks to form a n internetwork
ARP
Address resolution protocol: Connects an IP address to a physical machine
ACL
Access Control List: A set of router rules to allow or deny traffic based upon characteristics
DMZ
Demilitarized Zone: Accepts connections from the internet over certain ports, these are invisible to the outside network
Bastion Hosts
Hosts or servers in the DMZ which are not configured with any services that run o the local network
Jumpbox
A hardened server that provides access to other hosts within the DMZ
NAC
Network access control: Devices are scanned to determine its current state prior to granting access on a network
Persistent agents
software installed on the device requesting access to the network
Switch spoofing
Attacker configures their device to pretend it is a switch and uses it to negotiate a trunk link to break out of a VLAN
Double tagging
Attacker adds an additional VLAN tag to create an inner and outer tag.
NAT
Network access translation: Changing IP addresses while it transits across a router
PAT
Port address translation: Router keeps track of requests from internal hosts by assigning them random ports for each request
Class A
10.0.0.0 to 10.255.255.255