From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Network address spoofing

Network address spoofing

- [Instructor] Network addresses are easily altered by anyone with administrative access to a system, so they should not be relied upon for authentication purposes. Attackers can modify both the IP address and the MAC address of a system. In the last video, you learned how attackers can engage in ARP poisoning attacks to redirect traffic headed for a system to a different device. This isn't the only type of attack that involves MAC addresses. Attackers may also engage in MAC spoofing attacks. MAC addresses are normally assigned to hardware by the manufacturer, so many people mistakenly believe that they cannot be changed. Unfortunately, that couldn't be further from the truth. While it is true that the default MAC address assigned to a system is created by the manufacturer, an administrator can easily change this value through normal operating system commands using a process called MAC cloning. An attacker might do this…

Contents