Posts In Category "Access Networking Threats"

VLAN Hopping

     -     Oct 3rd, 2013   -     Access Networking Threats, IT Threats   -     0 Comments

A VLAN hopping attack occurs when an attacker sends out packets destined for a system on a different VLAN that cannot normally be reached by the attacker. This traffic is tagged with a different VLAN ID (VID) to which the attacker belongs. Or, the attacking system may be trying to behave like a switch and […]

Read More →

STP Manipulation

     -        -     Access Networking Threats, IT Threats   -     0 Comments

STP protocol is used in switched networks to prevent the creation of bridging loops in an Ethernet network topology. Upon bootup, the switches begin a process of determining a loop-free topology. The switches identify one switch as a root bridge and block all other redundant data paths. By manipulating the STP root bridge determination calculations, […]

Read More →

PVLAN Attacks

     -        -     Access Networking Threats, IT Threats   -     0 Comments

A broadcast storm occurs when a network system is overwhelmed by continuous multicast or broadcast traffic. When different nodes are sending/broadcasting data over a network link, and the other network devices are rebroadcasting the data back to the network link in response, this will eventually cause the whole network to melt down and lead to […]

Read More →

MAC Table Overflow

     -        -     Access Networking Threats, IT Threats   -     0 Comments

A switch’s MAC address table contains network information such as MAC addresses available on each physical switch port and associated VLAN parameters. When switch receives a frame, the switch looks in the MAC address table (sometimes called MAC table) for the destination MAC address. Cisco Catalyst switch models use a MAC address table for Layer […]

Read More →

MAC Address Spoofing

     -        -     Access Networking Threats, IT Threats   -     0 Comments

MAC spoofing is a technique for changing a factory-assigned Media Access Control (MAC) address of a network interface on a networked device. The MAC address is hard-coded on a network interface controller (NIC) and cannot be changed. However, there are tools which can make an operating system believe that the NIC has the MAC address […]

Read More →

DHCP Attacks

     -        -     Access Networking Threats, IT Threats   -     0 Comments

DHCP Starvation A DHCP starvation attack works by broadcasting DHCP requests with spoofed MAC addresses. This is easily achieved with attack tools such as “the gobbler”. If enough requests are sent, the network attacker can exhaust the address space available to the DHCP servers for a period of time. This is a simple resource starvation […]

Read More →

Brute Force Attack

     -        -     Access Networking Threats, IT Threats   -     0 Comments

Brute force (exhaustive key search) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force to try all possible combinations) rather than employing intellectual strategies. Such an attack might be utilized when it is not possible […]

Read More →

Broadcast Storm

     -        -     Access Networking Threats, IT Threats   -     0 Comments

A broadcast storm occurs when a network system is overwhelmed by continuous multicast or broadcast traffic. When different nodes are sending/broadcasting data over a network link, and the other network devices are rebroadcasting the data back to the network link in response, this will eventually cause the whole network to melt down and lead to […]

Read More →

ARP Poisoning

     -        -     Access Networking Threats, IT Threats   -     0 Comments

ARP (address resolution protocol) operates by broadcasting a message across a network, to determine the Layer 2 address (MAC address) of a host with a predefined Layer 3 address (IP address). The host at the destination IP address sends a reply packet containing its MAC address. Once the initial ARP transaction is complete, the originating […]

Read More →

Unauthorized Access Attack

     -        -     Access Networking Threats, Corporate WAN Threats   -     0 Comments

Unauthorised access is the act of gaining access to a network, system, application or other resource without permission. Unauthorised access could occur if a user attempts to access an area of a system they should not be accessing. Unauthorised access could be result of unmodified default access policies or lack of clearly defined access policy […]

Read More →