null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
727624
U2.2 Switches, ARP
Descripción
Nework Security Mapa Mental sobre U2.2 Switches, ARP, creado por jjanesko el 07/04/2014.
Sin etiquetas
nework security
nework security
Mapa Mental por
jjanesko
, actualizado hace más de 1 año
Más
Menos
Creado por
jjanesko
hace más de 10 años
36
0
0
Resumen del Recurso
U2.2 Switches, ARP
addressing
MAC
media access control
unique identifier for NICs
source and destination in ethernet frames
48 bit value
IP
32 bits long
4 octects
reserved ranges for private networks
10.0.0.0 - 10.255.255.255
172.16.0.0-172.31.255.255
192.168.0.0-192.168.255.255
RFC 1918
ARP
address resolution protocol
protocol that translates MAC addresses to IP addresses
steps
1. Device broadcasts to network: who has IP 192.168.0.x?
ARP Query
2. All devices receive request and evaluate.
3. Device with 192.168.0.x responds with MAC address
ARP Reply
4. Querying device updates its ARP table
switches
network topology like hub
only sends frames to intended recipient (rather than broadcasting like hub)
generally more efficient than hubs because of this routing
maps ports to MAC addresses
layer 2
ARP spoofing
type of attack that uses ARP protocol to allow one network device to masquerade as another.
ARP spoofing steps (see note)
Adjunto:
U2.2 Switches, ARP - ARP spoofing steps
tools: DSniff http://www.monkey.org/~dugsong/dsniff/
defense
statically define ARP cache
big maintenance overhead
lock down port-MAC mapping
inflexible
issue notification of port-MAC change
legitimate use: failover scenario, crashed server
MAC flooding attack
type of attack where the switch becomes overwhelmed and does one of 2 things
switch does not accept any more mappings, freshly booted devices denied
switch stops routing and broadcasts all messages
steps
1. Attacker floods network with gratuitous ARP replies with fake MAC addresses.
2. Switch attempts to map fake addresses and fills up its mapping table.
defense
configure to ignore MAC address floods
could deny legitimate traffic
send admin alerts on MAC address floods
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
U2.6 SNMPv3
jjanesko
U2.1 Cables, Hubs, Sniffers
jjanesko
U2.4 LANs, MANs, WANs
jjanesko
U2.5 SNMPv1
jjanesko
U2.1 Cables,Hubs,Sniffers- Thin Ethernet
jjanesko
U2.5 SNMPv1 - architectural model
jjanesko
U2.1 Cables, Hubs, Sniffers - Hub Diagram
jjanesko
U2.2 Switches, ARP - ARP spoofing steps
jjanesko
U2.3 TCP, Routers - Router Diagram
jjanesko
U2.5 SNMPv1 - SNMPv1 protocol stack
jjanesko
U2.3 TCP, Routers, VLAN
jjanesko
Explorar la Librería