Question

T + 125% Media Comment Shape Text Chart Insert Table Add Page Zoom View Each student chooses one attack; then do some researc
0 0
Add a comment Improve this question Transcribed image text
Answer #1

LAYER 2 ATTACKS

VLAN HOPPING:

VLAN hopping is one of the primary VLAN based attack used by hackers to infiltrate network security.

   In this attacker is connected to an access port can gain an access to network to network traffic from another VLANs.

These attacks mainly are conducted in the Dynamic trunking protocol. Also in some cases the attacks are targeted to the trunking encapsulation protocol.

Using VLAN hopping attack, an attacker can sniff network traffic from another VLAN using a sniffer or send traffic from one VLAN to another VLAN.

VLAN hopping can be used to steal password and other sensitive information from specific network subscribers.

VLAN hopping can also be used to modify, corrupt or delete data install spyware or other malware programs, and propagate viruses, worms and trojans throughout the network.

There are two different types of VLAN hopping attacks.

Switch spoofing attack

Double tagging attack.

Switch spoofing attack:

the attacker will send DTP packets and tries to negotiate a trunk with the switch, this is possible when you use the default “dynamic auto” or “dynamic desirable” switchport mode. Once you have a trunk to your computer, you will have access to all VLANs. This is basically a misconfiguration since you should never configure your interfaces to use the dynamic switchport modes.

Double tagging attack:

In this form of VLAN hopping, the attacker tries to send data from one switch to another by sending frames with two 802.1Q headers – one for the victim switch and the other for the attacking switch. The victim switch accepts the frame because it thinks it is supposed to receive the incoming data. The target switch then forwards the frame to the destination based on the VLAN identifier in the second 802.1q header.

Consequences of VLAN Hopping

VLAN hopping can disable any security measures users may have in place on the device which maps routes between the VLAN's. Hackers use VLAN hopping to capture sensitive information such as bank account details and passwords from targeted network subscribers. VLAN hopping is also used by some attackers to corrupt, modify, or delete data from the end user's computer. Another intended use of VLAN hopping is to propagate viruses, worms, Trojan horses, and other malicious programs such as malware.

Preventing VLAN Hopping:

VLAN hopping can be prevented to some extend by turning off the auto trunking feature of all the switches which do not require trunking and by following specific recommendations from switch suppliers on VLAN security.

You should never use the default VLAN either because VLAN hopping is much more easily accomplished from the default VLAN. A good security measure is to assign all your used interfaces to some VLAN and never using any default VLAN, (typically VLAN 1) for anything

Add a comment
Know the answer?
Add Answer to:
T + 125% Media Comment Shape Text Chart Insert Table Add Page Zoom View Each student...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 125% v Collaborate Add Page Text Shape Comment Zoom Insert Table Chart Media View Project 2:...

    125% v Collaborate Add Page Text Shape Comment Zoom Insert Table Chart Media View Project 2: Layer Attacks and Prevention List Each student chooses one attack; then do some research, describe: How the attack works What the prevention (or detection or mitigation) method is for this attack Font 1. Layer 2 attacks or lower layer attacks Aria VLAN hopping. Spanning-Tree Attack Jamming Attack Vulnerability on Neighbor Discovery Protocol (NDP) GARP Attacks/ARP poisoning Private VLAN Proxy Attack MAC flooding, MAC spoofing...

  • T Wiew 125% Zoom + Add Page HW TEET Insert Table Chart Text Shape Media Comment...

    T Wiew 125% Zoom + Add Page HW TEET Insert Table Chart Text Shape Media Comment 23. When a seller offers a cash discount with terms of 3/10, n/60, this means that the buyer gets a discount of 10 percent if he pays his bill within 10 days; otherwise the entire amount is due in 60 days. 24. Time of the year and inventory levels affect pricing decisions. _25. Some firms let their competitors make pricing decisions for them. Part...

  • 126% + Zoom Add Page T Text View Insert Table Chart Shape Media Comment Collaborate Format...

    126% + Zoom Add Page T Text View Insert Table Chart Shape Media Comment Collaborate Format Document 1. (1 point) Compute the predetermined overhead rate Morrison will use to apply MOH to work in process. 2. (1 point) year. Compute the amount of overhead applied to Work-in-Process during the 3. (3 points) Compute the ending balances in Raw Materials, Work-in-process, and Finished Goods accounts (hint: don't forget to include beginning balances). 4. (2 points) Compute the amount of over- or...

  • 125% Zoom + Add Page w Insert Table Chart Text Shape Media Comment 9. ISB Inc....

    125% Zoom + Add Page w Insert Table Chart Text Shape Media Comment 9. ISB Inc. produces only widgets. Each widget has a variable cost of $11. The price that each widget sells for is $35. Monthly fixed costs for ISB are $24,300. a. How many widgets must ISB sell to break even every month? b. How many widgets must ISB sell to make a monthly profit af $12,000? 18 words ora

  • 125% Zoom T Insert HE Table T Text = Media Comment View Chart Shape Collaborate Format...

    125% Zoom T Insert HE Table T Text = Media Comment View Chart Shape Collaborate Format Document Text C) Will the major product of free radical bromination (Bra, light) of butane be: achiral, racemic, or a single enantiomer? Body Style Layout More Font Arial Regular 12 pt Character Styles None* Alignment Question 3 (20 points): Provide structures for compounds A-E in the boxes provided below. T oke Br 2 NaNII E-3-hexene → B - Spacing 10 - Single Bullets &...

  • + 125% Zoom W Add Page M Insert ul T Chart Text Table = Shape Media...

    + 125% Zoom W Add Page M Insert ul T Chart Text Table = Shape Media Comment Diverse and delicate mechanisms maintain cytoplasmic and organellar proteostasis. Answer following questions. (2 X 10 points = 20 points). 1. Molecular chaperones (heat shock proteins, HSPs) play key roles in proteostasis. How do molecular chaperones regulate (1) activation of HSF1 (a transcription regulator of HSPs), and (2) unfolded protein response (UPR) in the ER? 2. ATFS-1, OPA1, and PINK1 are molecular factors involved...

  • 125% Zoom THE Insert Table cul Chart T Text View Shape Media Comment Collaborate Format Document...

    125% Zoom THE Insert Table cul Chart T Text View Shape Media Comment Collaborate Format Document Text 4A Body Style Layout More Font Arial Regular 12 pt Character Styles None* Question 4 (20 points): Provide a detailed mechanism for the following transformation. Alignment HCI T oke no peroxides Spacing 10 - Single Bullets & Lists None

  • 125% Zoom T ul I Chart Text = Media Comment View Insert Table Shape Collaborate Format...

    125% Zoom T ul I Chart Text = Media Comment View Insert Table Shape Collaborate Format Document Text Body Style Layout More Font Question 5 (20 points): methylpropene Propose a synthesis of 4-methylpentanal from 2: Arial Regular 12 pt ty Character Styles None* 2-methylpropenc 4-methylpentanal Alignment T oke Spacing 10 - Single Bullets & Lists None

  • View Zoom Add Page Insert Table Chart Text Shape Media Comment Collaborate Format Document Text Normal...

    View Zoom Add Page Insert Table Chart Text Shape Media Comment Collaborate Format Document Text Normal (Web) 023 4 X -1600 1200 300 300 Calculate NPV@14% & IRR 300 Style More 14. An investment is expected to pay you $5000 per year for $10 years. What is this investment worth if you have an 8% required return? Font 13. If interest rates rise, what will bond prices do? What type of bonds will show the biggest s New Roman change...

  • 7 #2 125 % . View Add Page Zoom Insert Table Chart Text Shape Media Comment Collaborate Format Document Text Body 2) A...

    7 #2 125 % . View Add Page Zoom Insert Table Chart Text Shape Media Comment Collaborate Format Document Text Body 2) A T-shirt shop carries two competing shirts, one endorsed by Tim Duncan and the other by LeBron James. The owner of the store can obtain both types at a cost of $3 per shirt and estimates that if Duncan shirts are sold for r dollars apiece and James shirts for y dollars apiece, consumers will buy 50- 45r45y...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT