![]() The intention is to consume the limited memory set aside in the switch to store the MAC address table. In a typical MAC flooding attack, a switch is fed many Ethernet frames, each containing different source MAC addresses, by the attacker. The advantage of this method is that data is bridged exclusively to the network segment containing the computer that the data is specifically destined for. This allows the switch to direct data out of the physical port where the recipient is located, as opposed to indiscriminately broadcasting the data out of all ports as an Ethernet hub does. Switches maintain a MAC table that maps individual MAC addresses on the network to the physical ports on the switch. The attack works by forcing legitimate MAC table contents out of the switch and forcing a unicast flooding behavior potentially sending sensitive information to portions of the network where it is not normally intended to go. ![]() In computer networking, a media access control attack or MAC flooding is a technique employed to compromise the security of network switches. Technique employed to compromise the security of network switches
0 Comments
Leave a Reply. |