From the course: Ethical Hacking: Vulnerability Analysis

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

LAN vulnerability scanners

LAN vulnerability scanners

From the course: Ethical Hacking: Vulnerability Analysis

Start my 1-month free trial

LAN vulnerability scanners

A local area network can be complex and difficult to manage. When on a LAN, layer two can be a very weak link and if attacked, any higher layers will most likely be affected and that includes your users. The LAN can fall victim to many different types of attacks. Here are a few. A spanning tree protocol attack sends multiple BPDU messages and creates a constant state of reelecting the root bridge which allows an attacker to be a man-in-the-middle and see frames from multiple sources. There are different types of spoofing attacks that are used in man-in-the-middle attacks. Those include ARP spoofing or ARP cache poisoning or MAC spoofing which changes the MAC address on a NIC card to allow an attacker to intercept traffic. A macof attack is launched against a switch, where the attacker floods the CAM table on a switch. The flood confuses the switch, the switch then acts like a HUB and sends data out all the interfaces.…

Contents