DePaul TDC 363 - local-attacks (17 pages)

Previewing pages 1, 2, 3, 4, 5, 6 of 17 page document View the full content.
View Full Document

local-attacks



Previewing pages 1, 2, 3, 4, 5, 6 of actual document.

View the full content.
View Full Document
View Full Document

local-attacks

86 views


Pages:
17
School:
DePaul University
Course:
Tdc 363 - Introduction to Local Area Networks
Introduction to Local Area Networks Documents

Unformatted text preview:

Local Network Attacks John Kristoff jtk depaul edu 1 312 362 5878 DePaul University Chicago IL 60604 FIRST TC 2002 John Kristoff DePaul University 1 Agenda Overview Theoretical and example attacks How to resist if possible local network attacks References Tools FIRST TC 2002 John Kristoff DePaul University 1 Overview Local network attacks target an internal network Some attacks can be launched remotely Most do not monitor or guard against local attacks Ultimately everything is a physical security problem FIRST TC 2002 John Kristoff DePaul University 1 Theoretical and Example Attacks ARP LAN Bridge Switch Routing DHCP Multicast Other FIRST TC 2002 John Kristoff DePaul University 1 ARP based Attacks ARP request spoofing Responders to a request cache the sender s info As do others who already have the sender s info ARP update spoofing gratutious ARP Thinking out loud Is UNARP widely used Can we attack with it Can we poison ARP entries to group address FIRST TC 2002 John Kristoff DePaul University 1 Preventing ARP based Attacks Use LAN switches with one port per end host Enable port security to limit source MAC addresses Use 802 1x port authentication Enable get knobs on end hosts to validate ARPs How to best do this Monitor LAN bridge switch address tables Monitor router ARP tables Keep history of address ARP tables FYI vendors must support knobs at line rate FIRST TC 2002 John Kristoff DePaul University 1 LAN Bridge Switch Attacks Overflow MAC address tables to cause flooding Typical gear can hold a few thousand addresses MAC addresses 48 bits or a few thousand Spoof spanning tree BPDU messages Take over as root designated bridge Cause continuous topology recomputations Forge VLAN priority or aggregation tags Spoof PAUSE flow control frames gig only FIRST TC 2002 John Kristoff DePaul University 1 Preventing LAN Bridge Attacks Monitor MAC address tables Manually set root bridge and monitor Use knobs like Cisco s BPDU and Root Guard Manually set and prune trunked switch



View Full Document

Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view local-attacks and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view local-attacks and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?