Download presentation
Presentation is loading. Please wait.
Published byCody Barber Modified over 8 years ago
1
http://forum.ciscoinpersian.comhttp://forum.ciscoinpersian.com انجمن سیسکو به پارسی آشنایی با برخی حملات در لایه 2 آشنایی با برخی حملات در لایه 2 علیرضا محمدی علیرضا محمدی
3
Motivation Attack attack for data destroyed attack for Stealing computers data attack for data destroyed attack for down services
4
Switched Data Plane Attacks: STP Spoofing DHCP Attacks DHCP Attacks MAC address Attacks MAC address Attacks VLAN Hopping VLAN Hopping
5
VLAN Hopping : VLAN Hopping : 1- Switch spoofing 2- Double tagged attack
6
Switch spoofing
7
switch spoofing attack Mitigation switchport mode access switchport switchport nonegotiate
8
Double tagged attack
9
switchport trunk native vlan tagged Double tagged attack Mitigation ( Layer 3 Switch ) vlan dot1q tag native ( Layer 2 Switch )
10
MAC address Attacks : MAC address Attacks : 2- Mac Address Spoofing 1- CAM Flooding Attack
11
CAM Flooding Attack
12
CAM flooding attack Mitigation (config-if)#switchport port-security ? mac-address Secure mac address mac-address Secure mac address maximum Max secure addresses maximum Max secure addresses violation Security violation mode violation Security violation mode
13
Mac address spoofing Attack
14
CAM flooding attack Mitigation Dynamic ARP Inspection
15
1- DHCP Starvation DHCP Attacks : 2- DHCP Server Spoofing
16
DHCP Starvation
17
DHCP Server Spoofing
18
Spoofing & Starvation attack Mitigation DHCP Snooping dynamic ARP inspection
19
STP Spoofing Spoof Attack Sniff Attack
20
STP Spoofing
21
STP Spoofing Mitigation Root Guard BPDU Guard Access layer
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.