A LAN can be complex and difficult to manage. In this video, learn how GFI LanGuard can detect thousands of vulnerabilities before hackers can exploit them.
A local area network can be complex … and difficult to manage. … When on a LAN, layer two can be a very weak link … and if attacked, any higher layers will most likely … be affected and that includes your users. … The LAN can fall victim to many different types of attacks. … Here are a few. … A spanning tree protocol attack sends multiple BPDU messages … and creates a constant state of reelecting the root bridge … which allows an attacker to be a man-in-the-middle … and see frames from multiple sources. … There are different types of spoofing attacks … that are used in man-in-the-middle attacks. … Those include ARP spoofing or ARP cache poisoning … or MAC spoofing which changes the MAC address on a NIC card … to allow an attacker to intercept traffic. … A macof attack is launched against a switch, … where the attacker floods the CAM table on a switch. … The flood confuses the switch, … the switch then acts like a HUB … and sends data out all the interfaces. … There are various protocol attacks. …
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Common causes of vulnerabilities
- Identifying and assessing vulnerabilities
- The Common Vulnerability Scoring System (CVSS)
- Outsourcing vulnerability analysis
- Leveraging Nikto and other vulnerability assessment tools
- Securing mobile devices
- Defending the LAN