2. Network Security - Adjacent Attacks (LAN Security) | Terminology

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

flashcard set

Earn XP

Description and Tags

Attacks that require the attacker to be on the same local network as their target. Includes ARP poisoning, MAC flooding, DHCP attacks, and VLAN hopping techniques that exploit weaknesses in local network protocols.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

ARP Poisoning

A Man-in-the-Middle attack where an attacker sends spoofed ARP messages to manipulate the ARP tables of devices on a LAN, redirecting traffic through the attacker.

2
New cards

ARP Reply Spoofing

A method of ARP poisoning where an attacker sends fake ARP replies to targeted victims.

3
New cards

Gratuitous ARP (GARP) Spoofing

A method of ARP poisoning where an attacker broadcasts fake ARP messages to update the ARP cache of all devices on a network.

4
New cards

Dynamic ARP Inspection (DAI)

A security feature that validates ARP packets against a trusted database to prevent ARP spoofing attacks.

5
New cards

MAC Flooding

An attack that overwhelms a switch's CAM table with fake MAC addresses, forcing it to broadcast all traffic like a hub.

6
New cards

Port Securtiy

A switch feature that restricts the number of MAC addresses allowed to connect to each port, preventing MAC flooding.

7
New cards

DHCP Starvation

An attack where an attacker rapidly requests all available IP addresses from a DHCP server, preventing legitimate users from obtaining an address.

8
New cards

Rogue DHCP Server

A malicious DHCP server set up by an attacker to distribute incorrect network settings, enabling Man-in-the-Middle attacks

9
New cards

DHCP Snooping

A security feature that filters DHCP messages and builds a binding table to prevent rogue DHCP servers and DHCP-based attacks

10
New cards

VLAN Hopping

An Attack that allows a device in one VLAN to gain unauthorized access t otraffic on other VLANS

11
New cards

Switch Spoofing

A VLAN hopping technique where an attacker tricks a switch into thinking it is another switch to establish a trunk link.

12
New cards

Double Tagging

A VLAN hopping technique that exploits native VLAn behavior by adding multiple VLAN tags to a frame

13
New cards

Dynamic Trunking Protocol (DTP)

A Cisco protocol that automatically negotiates trunk connections between switches, which can be exploited for VLAN hopping.

14
New cards

Native VLAN

The VLAN that carries untagged traffic across a trunk link, which can be exploited in double tagging attacks.