1/13
Attacks that require the attacker to be on the same local network as their target. Includes ARP poisoning, MAC flooding, DHCP attacks, and VLAN hopping techniques that exploit weaknesses in local network protocols.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
ARP Poisoning
A Man-in-the-Middle attack where an attacker sends spoofed ARP messages to manipulate the ARP tables of devices on a LAN, redirecting traffic through the attacker.
ARP Reply Spoofing
A method of ARP poisoning where an attacker sends fake ARP replies to targeted victims.
Gratuitous ARP (GARP) Spoofing
A method of ARP poisoning where an attacker broadcasts fake ARP messages to update the ARP cache of all devices on a network.
Dynamic ARP Inspection (DAI)
A security feature that validates ARP packets against a trusted database to prevent ARP spoofing attacks.
MAC Flooding
An attack that overwhelms a switch's CAM table with fake MAC addresses, forcing it to broadcast all traffic like a hub.
Port Securtiy
A switch feature that restricts the number of MAC addresses allowed to connect to each port, preventing MAC flooding.
DHCP Starvation
An attack where an attacker rapidly requests all available IP addresses from a DHCP server, preventing legitimate users from obtaining an address.
Rogue DHCP Server
A malicious DHCP server set up by an attacker to distribute incorrect network settings, enabling Man-in-the-Middle attacks
DHCP Snooping
A security feature that filters DHCP messages and builds a binding table to prevent rogue DHCP servers and DHCP-based attacks
VLAN Hopping
An Attack that allows a device in one VLAN to gain unauthorized access t otraffic on other VLANS
Switch Spoofing
A VLAN hopping technique where an attacker tricks a switch into thinking it is another switch to establish a trunk link.
Double Tagging
A VLAN hopping technique that exploits native VLAn behavior by adding multiple VLAN tags to a frame
Dynamic Trunking Protocol (DTP)
A Cisco protocol that automatically negotiates trunk connections between switches, which can be exploited for VLAN hopping.
Native VLAN
The VLAN that carries untagged traffic across a trunk link, which can be exploited in double tagging attacks.