What types of attacks are Switches vulnerable to?
MAC Flooding
MAC Spoofing
Physical Tampering
What is MAC Flooding?
An attempt to overwhelm the limited switch memory that is set aside to store the MAC addresses for each port.
Note: If the switch gets flooded, it can “fail-open” and start sending information out to every port.
What is MAC Spoofing?
This occurs when an attacker masks their own MAC address to pretend they are another MAC address.
Note: MAC spoofing is often combined with ARP spoofing attacks.
What is Physical Tampering?
The attacker gains physical access to the switch and can do a number of things to it.
What layer of the OSI Model is the switch?
Layer 2