Questions tagged [data-link-layer]

7 questions
3
votes
2 answers

How to identify L2 devices in a Wide Area Network?

This is sample of a traceroute to google.com: TraceRoute from Network-Tools.com to 216.58.194.46 [google.com] Hop (ms) (ms) (ms) IP Address Host name 1 0 0 0 206.123.64.233 - 2 Timed out Timed…
R1W
  • 1,617
  • 3
  • 15
  • 30
1
vote
0 answers

Force A Reply WPA/WPA2

I am working on an open source project, and am currently stumped. Let’s say I have a client connect to a wireless WPA network I am not authenticated to the wireless network I just have a wireless card in monitor mode. Is there a way Is there…
1
vote
1 answer

How Data Link layer trailer prevents data from being intercepted and tampers

I am reading on https://tryhackme.com/room/introtonetworking, it is talking about OSI model. It said that Data Link layer trailer can increase security as the data can't be intercepted and tampered. How can it do it?. If it is because of the trailer…
1
vote
1 answer

Would it be possible to create an external mac address spoofer?

I was wondering if it would be possible to create some sort of ethernet passthrough device, but this device also functions as a layer 2 mac address spoofer, which can be used with any device without the need for a software mac address spoofer, or…
Alexm
  • 11
  • 1
1
vote
1 answer

Is the perfect MITM attack possible?

Let's imagine a data link layer level MITM attack. Is it possible to fulfill all of the following points? you completely hide your identity by forging your own MAC address you create malformed packets, so the router doesn't even know you are…
user238715
1
vote
1 answer

Can you scan unmanaged switches with vulnerability scanners?

The target switches do not have IP addresses and most scanners require IPs as targets. Can you scan unmanaged switches with vulnerability scanners? What scanners can target layer 2?
0
votes
2 answers

MITM using ARP spoofing with Kali Linux running on VirtualBox with bridged wifi network adapter

At home I have two laptops (running on Windows). With one laptop (attacking laptop) I try to get in the middle of the connection of other laptop (victim laptop). To do this is run Kali Linux in a virtual environment using VirtualBox on the attacking…