Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)

Buy
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff package). By using those attack tools, a hacker can defeat the security myth of a switch, which incorrectly states that sniffing and packet interception are impossible with a switch. Indeed, with dsniff, cain, and other user-friendly tools on a Microsoft Windows or Linux system, a hacker can easily divert any traffic to his own PC to break the confidentiality or the integrity of this traffic.

Most vulnerabilities are inherent to the Layer 2 protocols, ranging from Spanning Tree Protocol to IPv6 neighbor discovery. If Layer 2 is compromised, it is easier to build attacks on upper-layers protocols by using techniques such as man-in-the-middle (MITM) attacks. Because a hacker can intercept any traffic, he can insert himself in clear-text communication (such as HTTP or Telnet) and in encrypted channels (such as Secure Socket Layer [SSL] or secure shell [SSH]).

To exploit Layer 2 vulnerabilities, an attacker must usually be Layer 2 adjacent to the target. Although it seems impossible for an external hacker to connect to a company LAN, it is not. Indeed, a hacker can use social engineering to gain access to the premises, or he can pretend to be an engineer called on site to fix a mechanical problem.

Also, many attacks are run by an insider, such as an onsite employee. Traditionally, there has been an unwritten and, in some cases, written rule that employees are trusted entities. However, over the past decade, numerous cases and statistics prove that this assumption is false. The CSI/FBI 2006 Computer Crime and Security Survey1 reported that 68 percent of the surveyed organizations’ losses were partially or fully a result of insiders’ misbehavior.

Once inside the physical premises of most organizations, it is relatively easy to find either an open Ethernet jack on the wall or a networked device (for example, a network printer) that can be disconnected to gain unauthorized network access. With DHCP as widely deployed as it is and the low percentage of LAN-based ports requiring authentication (for example, IEEE 802.1X), a user’s PC obtains an IP address and, in most cases, has the same level of network access as all other valid authorized users. Having gained a network IP address, the miscreant user can now attempt various attacks.
(HTML tags aren't allowed.)

Business Model Innovation in the Era of the Internet of Things: Studies on the Aspects of Evaluation, Decision Making and Tooling (Progress in IS)
Business Model Innovation in the Era of the Internet of Things: Studies on the Aspects of Evaluation, Decision Making and Tooling (Progress in IS)
This book outlines an integrative framework for business-model innovation in the paradigm of the Internet of Things. It elaborates several tools and methodologies for the quantitative, qualitative, analytical and effectual evaluation, and analyzes their applicability and efficiency for several phases of the business-model innovation process. As...
Beginning Fedora: From Novice to Professional
Beginning Fedora: From Novice to Professional
Linux has come a long way in a short time. Computing itself is still relatively young by any standard; if the era of modern computing started with the invention of the microchip, it’s still less than 50 years old. But Linux is a youngster compared even to this; it has been around for only 16 of those years.

In that brief time span,
...
UML For The IT Business Analyst, Second Edition
UML For The IT Business Analyst, Second Edition

Today, information-technology business analysts are often working on object-oriented (OO), Unified Modeling Language (UML) projects, yet they have a long way to go to exploit the technology beyond the adoption of use cases (just one part of the UML). This book explains how, as an IT business analyst, you can pull together all of the UML tools...


Agility Across Time and Space: Implementing Agile Methods in Global Software Projects
Agility Across Time and Space: Implementing Agile Methods in Global Software Projects

Rather than deciding whether or not to get involved in global sourcing, many companies are facing decisions about whether or not to apply agile methods in their distributed projects. These companies are often motivated by the opportunities to solve the coordination and communication difficulties associated with global software development....

The Facts on File Algebra Handbook (Science Handbook)
The Facts on File Algebra Handbook (Science Handbook)
The mathematics that we teach and learn today includes concepts and ideas that once were pondered only by the most brilliant men and women of ancient, and not so ancient, times. Numbers such as 1,000, for example, or two, or zero, were at one time considered very abstract ideas. There was a time when a quantity more than two or three was simply...
GameMaker: Studio For Dummies (For Dummies (Computer/Tech))
GameMaker: Studio For Dummies (For Dummies (Computer/Tech))

Get gaming faster with the official guide to GameMaker: Studio

GameMaker: Studio allows you to create your own games, even with zero coding experience, and GameMaker: Studio For Dummies is a complete guide to the ins and outs of the program. Create the game you've always wanted to play in record time and at a...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy