![]() ![]() ![]() The attacker will be able to capture sensitive data from network. Now, what is the benefit of the attacker? The attacker's machine will be delivered with all the frames between the victim and another machines. Frames are flooded to all ports, similar to broadcast type of communicaton. Once the switch's MAC address table is full and it can not save any more MAC address, its enters into a fail-open mode and start behaving like a network Hub. The switch can not save any more MAC address in its MAC Address table. Switch's MAC address table has only a limited amount of memory. Within a very short time, the switch's MAC Address table is full with fake MAC address/port mappings. This type of attack is also known as CAM table overflow attack. MAC address flooding attack (CAM table flooding attack) is a type of network attack where an attacker connected to a switch port floods the switch interface with very large number of Ethernet frames with different fake source MAC address.įollowing images shows a Switch's MAC address table before and after flooding attack.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |