MAC spoofing in a switch LUT
as title says it all. Thsi thread can be taken as a continuation of Goyal's thread "changing Physcial address of a computer"
Now consider this where you have a 4 port switch of which one port(say port no 4) is connected to a hub which supports 3 more systems.
switch A, HUB H
Switch LOOK UP table can be something like
MAC----PORT
A ------1
B ------2
C ------3
D ------4
D ------4 // this should have been E -----4 , E has spoofed D MAC ID
F-------4
now, if A has data for original D , how does it flow without being intercepted by E acting as D.
infact even without a hub or anyhting , just a normal switch lookups having a faulty entry, is there a possible solution to send datagrams securely?
Now consider this where you have a 4 port switch of which one port(say port no 4) is connected to a hub which supports 3 more systems.
switch A, HUB H
Switch LOOK UP table can be something like
MAC----PORT
A ------1
B ------2
C ------3
D ------4
D ------4 // this should have been E -----4 , E has spoofed D MAC ID
F-------4
now, if A has data for original D , how does it flow without being intercepted by E acting as D.
infact even without a hub or anyhting , just a normal switch lookups having a faulty entry, is there a possible solution to send datagrams securely?
Replies
-
Ashraf HZ
In this instance, you may need to rely on the upper layers of TCP/IP for the required security.durgaas title says it all. Thsi thread can be taken as a continuation of Goyal's thread "changing Physcial address of a computer"
Now consider this where you have a 4 port switch of which one port(say port no 4) is connected to a hub which supports 3 more systems.
switch A, HUB H
Switch LOOK UP table can be something like
MAC----PORT
A ------1
B ------2
C ------3
D ------4
D ------4 // this should have been E -----4 , E has spoofed D MAC ID
F-------4
now, if A has data for original D , how does it flow without being intercepted by E acting as D.
infact even without a hub or anyhting , just a normal switch lookups having a faulty entry, is there a possible solution to send datagrams securely? -
optimystix
but since the mac has been spoofed , wont the arp itself be misled ?ashIn this instance, you may need to rely on the upper layers of TCP/IP for the required security.
You are reading an archived discussion.
Related Posts
I stumbled upon this blog post: How to become a world class Computer Engineer - abhishek desai's posterous
What's your opinion?
hi friends.. i have been listening 1 constant statement about India.
"India is a developing country" since long time
why is it taking so long for India to develop?
what...
how to proceed with a mini projeci .give some topics simple and which will be successful also the abstract
😕 I am a 2nd year student.
I am so confused that weather I should do summer trainning or go for some other course that will be useful in mu...
Quick Heal CEan of the month January 2010 is...
😁CEan - Vega😁
With over 100 useful posts in less than a months' time, CEan Vega is our CEan of...