From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Network address spoofing
From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Network address spoofing
- [Instructor] Network addresses are easily altered by anyone with administrative access to a system, so they should not be relied upon for authentication purposes. Attackers can modify both the IP address and the MAC address of a system. In the last video, you learned how attackers can engage in ARP poisoning attacks to redirect traffic headed for a system to a different device. This isn't the only type of attack that involves MAC addresses. Attackers may also engage in MAC spoofing attacks. MAC addresses are normally assigned to hardware by the manufacturer, so many people mistakenly believe that they cannot be changed. Unfortunately, that couldn't be further from the truth. While it is true that the default MAC address assigned to a system is created by the manufacturer, an administrator can easily change this value through normal operating system commands using a process called MAC cloning. An attacker might do this…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Denial of service attacks4m 15s
-
(Locked)
Eavesdropping attacks4m 12s
-
(Locked)
DNS attacks3m 30s
-
(Locked)
Layer 2 attacks2m 3s
-
(Locked)
Network address spoofing3m 38s
-
(Locked)
Wireless attacks2m 59s
-
(Locked)
Propagation attacks4m 19s
-
(Locked)
Preventing rogues and evil twins2m 50s
-
(Locked)
Disassociation attacks2m 10s
-
(Locked)
Understanding Bluetooth and NFC attacks2m 2s
-
(Locked)
RFID security2m 25s
-
(Locked)
-
-
-