Evaluating switches

Another device we will most likely encounter is the switch. Since a switch is a unicast device and only floods all ports with broadcast traffic, when we are up against one, we want to try and create a situation where the switch will either forward packets incorrectly to the wrong destination that we hope is us or get the switch to flood all information out all ports, in effect becoming a hub.

The attacks we want to look at are called layer two attacks. While it is true that there are switches that operate all the way up to layer seven of the Open System Interconnect (OSI) model, we will focus on the more traditional approach that operates at layer two.

For a number of years, we enjoyed the luxury of being able to flood a switch ...

Get Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.