3.2 MAC Flooding and Spoofing

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/25

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

26 Terms

1
New cards

MAC Spoofing

changing a device’s MAC address to pretend to be another device

2
New cards

Purpose of MAC Spoofing

bypass security or trick the network into sending someone else’s data

3
New cards

MAC Spoofing Analogy

like wearing someone else’s nametag so the network thinks you’re them

4
New cards

MAC Addresses and NICs

MACs are hardcoded but many drivers allow software-level modification

5
New cards

MAC Flooding

overwhelming a switch with many fake MAC addresses

6
New cards

Effect of MAC Flooding

forces a switch to flood traffic to all ports, acting like a hub

7
New cards

Why Flooding Helps Attackers

broadcast traffic makes data easy to capture

8
New cards

CAM Table Purpose

maps MAC addresses to specific switch ports

9
New cards

CAM Table Attack Behavior

thousands of fake MACs fill the table

10
New cards

Fail-Open State

switch broadcasts all traffic when CAM table is full

11
New cards

MAC Spoofing Sign

same MAC address appears on two different ports

12
New cards

MAC Flooding Sign

many new MAC addresses suddenly appear on one port

13
New cards

Duplicate IP Significance

often indicates MAC spoofing

14
New cards

Flooding Danger

attackers capture sensitive data and network performance degrades

15
New cards

CAM Table Under Attack Sign 1

multiple MAC addresses show up on a single port

16
New cards

CAM Table Under Attack Sign 2

MAC assignments change frequently on one port

17
New cards

Spoofing vs Flooding

spoofing targets a specific identity; flooding affects the entire switch

18
New cards

Signs of Spoofing or Flooding 1

unknown MAC addresses appear

19
New cards

Signs of Spoofing or Flooding 2

multiple MAC addresses on the same port

20
New cards

Signs of Spoofing or Flooding 3

frequent MAC changes on a port

21
New cards

Real-World Analyst Task

monitoring for unusual network activity to prevent damage

22
New cards

Difference: Spoofing vs Flooding

spoofing impersonates; flooding overwhelms the switch

23
New cards

Flooding Impact on CAM Table

CAM table fills up with fake MAC entries

24
New cards

Reason for Duplicate IPs During Spoofing

attacker impersonates an existing device

25
New cards

Signs of MAC Flooding

many MACs on one port; unknown MACs exploding in count

26
New cards

Fail-Open Consequence

switch broadcasts all traffic, exposing sensitive data

Explore top flashcards

pos 14
Updated 1048d ago
flashcards Flashcards (32)
Sig. Codes Flashcards
Updated 809d ago
flashcards Flashcards (181)
AP.2 - Migrasyon
Updated 1134d ago
flashcards Flashcards (22)
Il corpo umano
Updated 358d ago
flashcards Flashcards (57)
Digestive System
Updated 962d ago
flashcards Flashcards (33)
pos 14
Updated 1048d ago
flashcards Flashcards (32)
Sig. Codes Flashcards
Updated 809d ago
flashcards Flashcards (181)
AP.2 - Migrasyon
Updated 1134d ago
flashcards Flashcards (22)
Il corpo umano
Updated 358d ago
flashcards Flashcards (57)
Digestive System
Updated 962d ago
flashcards Flashcards (33)