U2.2 Switches, ARP

Descripción

Nework Security Mapa Mental sobre U2.2 Switches, ARP, creado por jjanesko el 07/04/2014.
jjanesko
Mapa Mental por jjanesko, actualizado hace más de 1 año
jjanesko
Creado por jjanesko hace más de 10 años
36
0

Resumen del Recurso

U2.2 Switches, ARP
  1. addressing
    1. MAC
      1. media access control
        1. unique identifier for NICs
          1. source and destination in ethernet frames
            1. 48 bit value
            2. IP
              1. 32 bits long
                1. 4 octects
                2. reserved ranges for private networks
                  1. 10.0.0.0 - 10.255.255.255
                    1. 172.16.0.0-172.31.255.255
                      1. 192.168.0.0-192.168.255.255
                      2. RFC 1918
                    2. ARP
                      1. address resolution protocol
                        1. protocol that translates MAC addresses to IP addresses
                        2. steps
                          1. 1. Device broadcasts to network: who has IP 192.168.0.x?
                            1. ARP Query
                            2. 2. All devices receive request and evaluate.
                              1. 3. Device with 192.168.0.x responds with MAC address
                                1. ARP Reply
                                2. 4. Querying device updates its ARP table
                              2. switches
                                1. network topology like hub
                                  1. only sends frames to intended recipient (rather than broadcasting like hub)
                                    1. generally more efficient than hubs because of this routing
                                    2. maps ports to MAC addresses
                                      1. layer 2
                                      2. ARP spoofing
                                        1. type of attack that uses ARP protocol to allow one network device to masquerade as another.
                                          1. ARP spoofing steps (see note)

                                            Adjunto:

                                          2. tools: DSniff http://www.monkey.org/~dugsong/dsniff/
                                            1. defense
                                              1. statically define ARP cache
                                                1. big maintenance overhead
                                                2. lock down port-MAC mapping
                                                  1. inflexible
                                                  2. issue notification of port-MAC change
                                                  3. legitimate use: failover scenario, crashed server
                                                  4. MAC flooding attack
                                                    1. type of attack where the switch becomes overwhelmed and does one of 2 things
                                                      1. switch does not accept any more mappings, freshly booted devices denied
                                                        1. switch stops routing and broadcasts all messages
                                                        2. steps
                                                          1. 1. Attacker floods network with gratuitous ARP replies with fake MAC addresses.
                                                            1. 2. Switch attempts to map fake addresses and fills up its mapping table.
                                                            2. defense
                                                              1. configure to ignore MAC address floods
                                                                1. could deny legitimate traffic
                                                                2. send admin alerts on MAC address floods
                                                              Mostrar resumen completo Ocultar resumen completo

                                                              Similar

                                                              U2.6 SNMPv3
                                                              jjanesko
                                                              U2.1 Cables, Hubs, Sniffers
                                                              jjanesko
                                                              U2.4 LANs, MANs, WANs
                                                              jjanesko
                                                              U2.5 SNMPv1
                                                              jjanesko
                                                              U2.1 Cables,Hubs,Sniffers- Thin Ethernet
                                                              jjanesko
                                                              U2.5 SNMPv1 - architectural model
                                                              jjanesko
                                                              U2.1 Cables, Hubs, Sniffers - Hub Diagram
                                                              jjanesko
                                                              U2.2 Switches, ARP - ARP spoofing steps
                                                              jjanesko
                                                              U2.3 TCP, Routers - Router Diagram
                                                              jjanesko
                                                              U2.5 SNMPv1 - SNMPv1 protocol stack
                                                              jjanesko
                                                              U2.3 TCP, Routers, VLAN
                                                              jjanesko