Sniffing Flashcards
A unique identifier of a network node, typically ID of NIC
MAC address
Table used by switches.
Stores all available MAC addresses and their virtual LAN parameters for each port.
Content Addressable Memory (CAM) table
Flooding the switch with thousands of MAC address mappings such that it cannot keep up.
When the table can’t keep up it starts sending every message out to every port. Allowed by the fixed size of the CAM table.
MAC flooding attack
A security feature that prevents unauthorized DHCP servers from accessing a network. It’s a Layer 2 network switch feature that acts as a firewall between trusted DHCP servers and untrusted hosts
DHCP snooping
Exhaust all available addresses from the server. Exploits that DHCP has a limited number of IP addresses to lease. A type of Denial of Service attack
DHCP starvation
What are Yersinia & DHCPstarv?
DHCP starvation tools
What feature is a defense against too many incoming ARP broadcasts.
Each port on VLAN is untrusted by default
Each IP to MAC conversion is validated using DHCP snooping binding database.
Dynamic ARP Inspection (DAI)
Authentication & Configure DHCP snooping & Trusted sources are what?
DHCP starvation countermeasures
Protocol that resolves domain names into IP addresses using default port 53.
DNS
Manipulating the DNS table by replacing a legitimate IP address with a malicious one
DNS poisoning attack /DNS cache poisoning or DNS spoofing
Active monitoring
Keep DNS servers up-to-date
Randomize source and destination IP, query IDs, during name requests
Use HTTPS and/or TLS for securing the traffic
DNS poisoning countermeasures
Provides secure DNS data authentication by using digital signatures and encryption.
Adds cryptographic signatures to existing DNS records, stored in DNS name servers. Help verifying the true originator of DNS messaging
DNSSEC (Domain Name System Security Extension)
Allows multiple separate LANs/networks on same switch through logical grouping
VLAN
What is Frogger?
A tool used to execute the VLAN hopping attack
Attacking the network resources of the VLAN by sending packets to a port not usually accessible from an end system. The main goal of this form of attack is to gain access to other VLANs on the same network
VLAN hopping attack