Page 391 - StudyBook.pdf
P. 391

Infrastructure Security: Devices and Media • Chapter 6  375

                 and making the overall network more manageable. In addition,VLANs can add
                 security to a network. By segmenting a network, administrators can isolate the
                 traffic going across each VLAN.This keeps the data flowing across one VLAN from
                 being visible to the other.Another vulnerability of switches is that there is a chance
                 for an attacker to override the security features provided by the switch. For
                 example, a DoS attack can be performed against some older switches similar to the
                 type that can be performed against a router.This can result in overloading of the
                 buffers in the switch, making it act like a hub and sending all data going through
                 the switch to all ports.This would then allow an attacker to sniff out data as if they
                 were connected to a hub rather than a switch. Keep in mind, this vulnerability only
                 affects older switches and should not be a problem with newer switches.
                    In addition, packets can be sent to a switch that can make it think an attacking
                 system is a different system on the network and cause it to route packets intended
                 for the target over to the attacker instead.This is called ARP spoofing and is done by
                 sending an Address Resolution Protocol (ARP) packet to the switch containing
                 the machine name of the target and the MAC address of the attacker. By doing an
                 ARP spoof, intruders can hijack sessions that a client was previously using.
                    This can also be used as a man-in-the-middle (MITM) attack between two
                 network devices. Figure 6.4 shows an example network of how this works between
                 two clients.

                 Figure 6.4 Sample Network for ARP Spoofing

                                                        Switch
                                                         (S)
                                     Client                               Client
                                     (C1)                                  (C2)







                                                       Intruder
                                                         (I)







                                 Normal Communications
                                 Man in the Middle Attack




                                                                              www.syngress.com
   386   387   388   389   390   391   392   393   394   395   396