Questions tagged [switch]

15 questions
4
votes
2 answers

What is the attack surface on a L2 switch?

I'm trying to figure out what makes a "top brand" switch better than a "cheap unknown brand" one with the same features. I often see security thrown in the mix, but really can't understand how this is relevant, so I'm trying to figure out if it…
Dgm
  • 41
  • 1
2
votes
1 answer

What are the cons of dhcp snooping, dynamic arp inspection and ip guard?

I read about a couple of layer 2 protections against dhcp starving, mac and ip spoofing- ip guard, dhcp snooping and dynamic arp inspection. Are there any cons or vulnerabilies which enable bypassing them or are they safe to use? I have noticed…
adi
  • 101
  • 8
2
votes
1 answer

Security considerations for USB keyboard/mouse switches

I am considering purchasing a basic USB keyboard/mouse switching box in order to allow me to use the same keyboard and mouse with two different physical machines. This is similar to a KVM (keyboard video mouse) switch, but just for the input devices…
jamieweb
  • 425
  • 1
  • 3
  • 10
1
vote
1 answer

Can you scan unmanaged switches with vulnerability scanners?

The target switches do not have IP addresses and most scanners require IPs as targets. Can you scan unmanaged switches with vulnerability scanners? What scanners can target layer 2?
1
vote
1 answer

How WPA supplicant can determine whether switch supports authentication or not?

If a client(supplicant) configure to perform EAP-TLS authentication connects with a switch which doesn't requires authentication. How can supplicant determine that authentication is not required and go ahead without authentication?
1
vote
1 answer

Is VLAN Hopping through switch spoofing possible without DTP?

I've been reading about Switch Spoofing for some homework, and found that the attack is based on Cisco DTP protocol. In case I want to replicate the attack in class, I would use HP switch 2510 from our lab, which doesn't use DTP because it's a Cisco…
Btc Sources
  • 113
  • 6
1
vote
1 answer

Scanning a network via a hardline connection to a wired-switch NIC in promiscuous mode

Question from a CEHv9 exam preparation book: "When scanning a network via a hardline connection to a wired-switch NIC in promiscuous mode, what would be the extent of network traffic you would expect to see? A. Entire network B. VLAN you are…
cyzczy
  • 1,518
  • 5
  • 21
  • 34
0
votes
1 answer

Should I be seeing network management protocols on 'user' subnets?

When performing a passive packet capture of a network, I have seen a large amount of traffic being broadcast using different protocols. These protocols are primarily used to perform some kind of traffic routing/fail over/redundancy in case a device…
NULLZ
  • 11,426
  • 17
  • 77
  • 111
0
votes
1 answer

What are the security issues can be exploited to VLAN switches to compromise network?

While VLAN switches can be used to provide security between network segments using VLAN filtering rules. Is there any possibility to have an security issue which is exploited to VLAN switches?
Sivaram Rasathurai
  • 390
  • 2
  • 4
  • 15
0
votes
0 answers

When MAC flooding, why would an attacker specify IP addresses and/or TCP ports?

I'm specifically referring to the macof tool (part of the dsniff package). As I understand it, MAC flooding is meant to overload a switch's CAM table, which maps MAC addresses to switch ports. Where does specifying IP addresses and/or TCP ports fit…
0
votes
0 answers

MAC Flooding detection

I am interested in the metrics of the attack. Is there any packet rate that can be considered a reasonable threshold to detect this attack from traffic perspective? Or this is completely connected to the limits of the hardware?
ystv
  • 13
  • 2
0
votes
1 answer

Intercept network traffic with a hub

If I plugged a hub inbetween a switch and firewall, that also had a device running wireshark or similar capture software connected, due to the way a hub operates, would I be able to read ALL of the traffic between the switch and firewall, E.g. All…
Panomosh
  • 103
  • 3
0
votes
1 answer

What are the risks resulting from having a switch without strong access control directly facing the Internet?

At home I have a connection to my provider via glass fiber that provides two VLANs: IPTV and Internet. The structure of the network is exactly as shown in the following image, except for the phone connection, that I don't have. The router I use (in…
FarO
  • 313
  • 2
  • 7
0
votes
1 answer

Router vs router + switch security

I need to add some more ethernet devices to my network. I'd like to keep the current router and the only possibility to add more interfaces would be USB ethernet / PCI ethernet adapters. I could also use a network switch instead and connect it to…
some12
  • 1
0
votes
1 answer

Do HP ProCurve 1810G Config files have password hashes or other sensitive info?

I'm backing up some switches and I'm wondering if this config file should be kept secure. It is in binary so I do not know what it contains. What do the config files contain?
Daniel Grover
  • 872
  • 5
  • 10