
555555
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
Applied Knowledge: Summary Attack
¥ Goal: see traffic on the backbone but
interesting hosts have static ARP
entries and are very chatty (macof will
likely never steal their CAM entry)
¥ Step 1: MAC flood access switch
¥ Step 2: Run bridging software
(brconfig) on attacking host; advertise
as a priority zero bridge
GE
FE
FE
STP
BB
F
F
F
F
F
F
F
F
F
F
F
F
Root
Root
BB
X
X
Access
Switch
Root
Root
Attacker becomes root bridge
Spanning Tree recalculates
GE backbone becomes FE LL
LL
CAM table on access switch is
full (from macof); there is no
room at the inn for the chatty
servers. Traffic is flooded
Comentarios a estos manuales