From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Layer 2 attacks
From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Layer 2 attacks
- [Narrator] Attacks can also take place at layer two of the OSI model affecting the data link layer. The address resolution protocol ARP works at this layer and performs a function similar to DNS, but deeper down in the network stack. Instead of translating common domain names to IP addresses, ARP translates IP addresses to the hardware addresses used on local area networks. These hardware addresses are known as media access control or Mac addresses. Mac is just an acronym here and it has nothing to do with Macintosh computers. Now, much like DNS poisoning, ARP poisoning is a spoofing technique that provides false information in response to ARP requests. Unlike DNS poisoning, ARP poisoning only works on a local network. Normally a system sends all traffic to a gateway device. When ARP spoofing occur successfully, the victim system believes that another system is the gateway and sends all traffic to that system. Now,…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Denial of service attacks4m 15s
-
(Locked)
Eavesdropping attacks4m 12s
-
(Locked)
DNS attacks3m 30s
-
(Locked)
Layer 2 attacks2m 3s
-
(Locked)
Network address spoofing3m 38s
-
(Locked)
Wireless attacks2m 59s
-
(Locked)
Propagation attacks4m 19s
-
(Locked)
Preventing rogues and evil twins2m 50s
-
(Locked)
Disassociation attacks2m 10s
-
(Locked)
Understanding Bluetooth and NFC attacks2m 2s
-
(Locked)
RFID security2m 25s
-
(Locked)
-
-
-