Computer NetworksNETWORKS

MicroNuggets: CAM Table Overflow Attack Explained

Start your free week with CBT Nuggets. https://cbt.gg/2LZhF9F

In this video, Keith Barker covers CAM table overflow attacks. Keith covers just what this sort of attack against a switch is, why someone would want to do one, and how to prevent it. See a live demonstration of an attack and watch the procedure for mitigation.

The first step in understanding a CAM table overflow attack is remembering what a physical switch does, and how. A switch analyzes every frame that enters it and memorizes the source address. Storing that information in the content addressable memory space (CAM) means that in the future, when a frame comes in that needs routing, it can be forwarded on the back plane of the switch and delivered straight to the appropriate port. Since no other port sees the frames that get delivered in this way, it’s great for networking reasons. But if there’s a malicious eavesdropper on your network, they’re going to want to see those frames. So an eavesdropper might launch an attack against the place where those MAC addresses are stored, overload the switch, and force the switch back to its default state: broadcasting each frame to all ports. Get a live demonstration of a CAM attack and a walkthrough of implementing countermeasures.

Newest training from CBT Nuggets:

🆕 CCNP Enterprise (300-500) | https://courses.cbt.gg/20c

From the CBT Nuggets blog:

• Quickstart Guide to Learning Linux | https://blog.cbt.gg/vby
• Are Linux Certifications Worth It? | https://blog.cbt.gg/m0p
• Windows to Linux: Making the Switch | https://blog.cbt.gg/bwz
• Why Linux is More Secure than Windows | https://blog.cbt.gg/xmt
• What Can Linux Do that Windows Can’t? | https://blog.cbt.gg/zc0

Start learning with CBT Nuggets:

• Linux Essentials | https://courses.cbt.gg/fy2
• Linux Foundation Certified SysAdmin (LFCS) | https://courses.cbt.gg/2z6
• CompTIA Linux+ (XK0-004) | https://courses.cbt.gg/ork
• Linux Administrator LPIC-1 (201-400) | https://courses.cbt.gg/u9t
• Monitor and Configure Linux Storage | https://courses.cbt.gg/iwb

source

mac address

Alice AUSTIN

Alice AUSTIN is studying Cisco Systems Engineering. He has passion with both hardware and software and writes articles and reviews for many IT websites.

Leave a Reply

Your email address will not be published. Required fields are marked *