Computer Systems & �Network Administration
Security
Outline
MAC Flooding
L2 Security
L2 switch
L2 switch - MAC Table learning
, the switch learns that MAC address aa:aa:aa:aa:aa:aa is at port 1.
src MAC | dst MAC |
aa:aa:aa:aa:aa:aa | cc:cc:cc:cc:cc:cc |
L2 switch - MAC Table learning (cont.)
src MAC | dst MAC |
aa:aa:aa:aa:aa:aa | cc:cc:cc:cc:cc:cc |
L2 switch - MAC Table learning (cont.)
src MAC | dst MAC |
cc:cc:cc:cc:cc:cc | aa:aa:aa:aa:aa:aa |
L2 switch - MAC Table learning (cont.)
src MAC | dst MAC |
cc:cc:cc:cc:cc:cc | aa:aa:aa:aa:aa:aa |
Hub
https://zh.wikipedia.org/wiki/%E9%9B%86%E7%B7%9A%E5%99%A8#/media/File:4_port_netgear_ethernet_hub.jpg
MAC Flooding
https://support.f5.com/csp/article/K6567
MAC Flooding (cont.)
src MAC | dst MAC |
bb:bb:bb:bb:bb:bb | aa:aa:aa:aa:aa:aa |
dd:dd:dd:dd:dd:dd | aa:aa:aa:aa:aa:aa |
ee:ee:ee:ee:ee:ee | aa:aa:aa:aa:aa:aa |
ff:ff:ff:ff:ff:ff | aa:aa:aa:aa:aa:aa |
fake
MAC Flooding (cont.)
src MAC | dst MAC |
aa:aa:aa:aa:aa:aa | cc:cc:cc:cc:cc:cc |
not in the table, resulting in broadcast
table is full
MAC Flooding - How to defend
DHCP starvation、Rogue DHCP Servers
L2 Security
DHCP Procedure
https://www.twblogs.net/a/5b96ed672b717750bda7761f
DHCP starvation
Rogue DHCP Servers
malicious
DHCP starvation + Rogue DHCP Servers
DHCP Pool
IP lack
DHCP starvation - how to defend
unique MAC addresses
allowed on each
switch ports
https://www.packetorbit.net/post/dhcp-hardening
Rogue DHCP Servers - how to defend
https://www.packetorbit.net/post/dhcp-hardening
ARP Spoofing
L2 Security
ARP Request
https://ipcisco.com/lesson/address-resolution-protocol-arp/
broadcast
ARP Reply
https://ipcisco.com/lesson/address-resolution-protocol-arp/
unicast
ARP cache(ARP Table)
linux
windows
ARP spoofing
ARP spoofing
=> DoS
=> MITM
=> DDoS
ARP spoofing - how to defend
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/12-2/25ew/configuration/guide/conf/dynarp.html
ARP spoofing - some possible good usage
STP Spoofing
L2 Security
broadcast storm
broadcast storm
send a arp request
broadcast storm
broadcast storm
broadcast storm
broadcast storm
broadcast storm
STP
STP
STP attack will cause?
STP - TCN Attack
STP - TCN Attack
STP - Root role hijack
STP - Root role hijack
STP - BPDU DoS
STP - How to defend
L2 security tools
IP Spoofing
L3 Security
IP Spoofing
https://www.cloudflare.com/zh-tw/learning/ddos/glossary/ip-spoofing/
IP Spoofing(cont.)
Specialized IP Spoofing Packet
Specialized IP Spoofing Packet
On 103.172.124.2
Amplification Attacks
Amplification Attacks
Amplification Attacks
data centers in Cloudflare’s global network and the relative amount of memcached attack traffic they received during a recent attack
Specialized DNS packet
Specialized IP Spoofing Packet
On 103.172.124.2
IP Spoofing - how to defend
OWASP Top 10
What is OWASP Top 10
Security Weaknesses
What is OWASP Top 10
A10:2021-Server-Side Request Forgery
OWASP Top 10
What is Server-Side Request Forgery
What is Server-Side Request Forgery
What is Server-Side Request Forgery
What is Server-Side Request Forgery
What is Server-Side Request Forgery
What is Server-Side Request Forgery
What is Server-Side Request Forgery
What is Server-Side Request Forgery
playplay but dont break.
Please find out secret services.
Use testVPN (change AllowedIPs to 10.100.0.0/16, 10.31.31.0/24)