Skip to content

Latest commit

 

History

History
38 lines (26 loc) · 981 Bytes

File metadata and controls

38 lines (26 loc) · 981 Bytes

MAC Flooding Prevention & Execution

Prevention

Useful interface configuration commands:

  • switchport port-security maximum [number-of-addresses]
  • switchport port-security
  • switchport port-security aging time [time]
  • switchport port-security aging type {absolute | inactivity}
  • switchport port-security mac-address {mac-addr | sticky}

Execution

Setup

  1. Setup your topology
    • It needs to include a switch at least
  2. Install the required software for this attack
    • Have a Linux machine or a linux virtual machine (VM).

    • install the software on the machine

      ~$ sudo apt install dsniff

Flood Mac Addresses

  1. Run attack in the terminal

    ~$ sudo macof -i <interface-name>
    # For example: sudo macof -i eth0
  2. Use "Control-C" to exit the program

  3. All traffic is now flooded out the switch, so you can now view all traffic that goes through the switch in wireshark.