9.3.4.1 - MAC Flooding Attack Video

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/8

flashcard set

Earn XP

Description and Tags

These flashcards cover the key concepts related to MAC flooding and how switches operate with MAC address tables.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

9 Terms

1
New cards

MAC Flooding

A technique used by attackers to overwhelm a switch's MAC address table with excessive fake MAC addresses.

2
New cards

MAC Address Table

A table maintained by switches to track the association between MAC addresses of workstations and their corresponding ports.

3
New cards

Fail Open Mode

A condition in which a switch cannot store more MAC addresses, causing it to behave like a network hub, sending incoming packets to all ports.

4
New cards

Content Address Memory (CAM) Table

Another term for the MAC address table, used by switches to quickly locate the devices connected to each port.

5
New cards

Switch Operation

The process by which a switch forwards information based on the destination MAC address found in data frames.

6
New cards

Port Behavior in Switches

The way switches forward packets only to the intended recipient's port, preventing other workstations from seeing the data.

7
New cards

Data Frame

A unit of data sent over the network, containing source and destination MAC addresses.

8
New cards

Attacker's Goal in MAC Flooding

To intercept and view all data passing through the switch, which is normally restricted to intended recipients.

9
New cards

Workstations A, B, C, and D

Examples of devices in the network that communicate through the switch.