From the course: Certified Information Security Manager (CISM) Cert Prep (2022): 2 Information Security Risk Management
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
Layer 2 attacks
- Attacks can also take place at layer two of the OSI model, affecting the data link layer. The address resolution protocol, ARP, works at this layer and performs a function similar to DNS, but deeper down in the network stack. Instead of translating common domain names to IP addresses, ARP translates IP addresses to the hardware addresses used on local area networks. These hardware addresses are known as media access control or MAC addresses. MAC is just an acronym here and has nothing to do with Macintosh computers. Now, much like DNS poisoning, ARP poisoning is a spoofing technique that provides false information in response to ARP requests. Unlike DNS poisoning, ARP poisoning only works on a local network. Normally, a system sends all traffic to a gateway device. When ARP spoofing occurs successfully, the victim system believes that another system is the gateway and sends all traffic to that system. Now, that system…
Contents
-
-
-
-
-
-
-
(Locked)
Denial of service attacks4m 15s
-
(Locked)
Eavesdropping attacks4m 12s
-
(Locked)
DNS attacks3m 30s
-
(Locked)
Layer 2 attacks2m 3s
-
(Locked)
Network address spoofing3m 35s
-
(Locked)
Password attacks8m 12s
-
(Locked)
Password spraying and credential stuffing1m 47s
-
(Locked)
Watering hole attacks2m 54s
-
(Locked)
-
-
-
-
-
-
-
-