Occurs when one machine is continually flooding a victim with requests for sevices
Denial of Service (DoS) Attack
A specific type of DoS attack that occurs when an attacker initiates multiple TCP sessions, but never complete those sessions
TCP SYN Flood
Occurs when an attacker pings a subnet broadcast with a spoofed source IP, making the victimized server appear as the source
Smurf Attack (ICMP Flood)
Occurs when an attacker uses many computers all at the same time, asking for access to a single server
Distributed Denial of Service (DDoS) Attack
Botnet - Collection of compromised computers
Zombie - Any one of the individually compromised computers
A network attack technique that attempts to compromise the security of a network switch by attempting to overflow the switch’s MAC table
MAC Flooding
Normally, a switch utilizes its MAC table to associate switchports with connected device MAC address
Occurs when an attacker captures sensitive data by forcing the switch to broadcast traffic
Data Snooping
Arises from MAC flooding, causing a DoS attack by overwhelming the network with unnecessary traffic
Disrupting Service
Bypassing Security Measures
MAC flooding can bypass security measures like MAC address filtering
To secure your networks you should:
Use anomaly-based Intrusion Detection System (IDS)
Configure port security to limit MAC addresses per port
Set MAC address limits per switchport
Implement VLANs to segregate traffic
A fundamental concept in IP networking that is used to map an IP address to MAC addresses on a local area network
Address Resolution Protocol (ARP)
An attack wherein an attacker sends falsified ARP messages over a LAN | attacker aims to associate their MAC address with a target IP address
ARP Spoofing
ARP spoofing can be used to initiate an on-path attack inside of a Layer 2 network
A form of attack that corrupts the ARP cache (ARP table) in the network
ARP Poisoning
ARP poisoning allows an attacker to alter the network traffic flow, and enable data interception, session hijacking, or Dos attack
ARP Spoofing - Conducts a more targeted attack
ARP Poisoning - Target all devices in a LAN
How to detect ARP attacks?
Use ARP monitoring tools to track ARP address mappings
Alert network admins of unusual ARP traffic patterns
Configure IDSs to detec traffic anomalies
How to prevent ARP spoofing and ARP poisoning?
Static ARP Entries - Manually inputting ARP mappings to prevent spoofing
Dynamic ARP Inspection - Switches inspect ARP packets, dropping suspicious mappings based on trusted MAC-IP pairs
Network Segmentation - Dividing the network into smaller segments limits the impact of ARP attacks and simplifies network management
VPNs or Encryption Technologies - VPN and encryption safeguard data against alterations from successful ARP spoofing
Used to partition any broadcast domain and isolate it from the rest of the network at the data link layer (Layer 2) of the OSI model
Virtual Local Area Network (VLAN)
Layer 3 routing is used, enabling application of access control lists to segregate and filter traffic between VLANs efficiently
As a network penetration tester, breaking out of a VLAN from a user’s workstation is necessary to access sensitive network areas
A technique that exploits a misconfiguration to direct traffic to a different VLAN without proper authorization | Double Tagging, switch spoofing, mac table overflow attack
VLAN Hopping
A method where the attacker tries to reach a different VLAN using vulnerabilities in the trunk port configuration
Double Tagging
Inner tag - True destination
Outer tag - Native VLAN