Layer 2 devices can be vulnerable to attacks like MAC, VLAN hopping, ARP, Spanning Tree, and DHCP starvation attacks. The document discusses these attack types and methods to mitigate them through configurations like port security, DHCP snooping, root guard, and BPDU guard on switches. CAM table overflow attacks can also allow VLAN hopping by overloading the CAM table. Proper trunk port configuration and disabling unused ports and VLANs helps prevent various Layer 2 attacks.
2. Why We need Layer 2 security?
OSI layer was build to allow different layers to work without knowledge of each other.
Layer 2 can be very weak link in the network.
3. If any one of the layer hacked, communications are compromised.
6. What is MAC and CAM ?
MAC is 48 Bit L2 address
1234.5678.9ABC
First 24 bits is manufacture code
Assigned by IEEE
00-50-56XX-XXXX
Second 24 bits is specific interface,
Assigned by Manufacture
XXXX-XXC0-00-01
Content Addressable memory (CAM) table stores information such as MAC
addressed available on physical ports with their associated VLAN parameters.
http://www.nirsoft.net/utils/mac_address_lookup_find.html
10. How Bypass the CAM?
1. Due to hardware restrictions, CAM has fixed size memory
2. Different switches has different size of CAM table
3. Overload the CAM to bypass the MAC table restriction
14. Duration of this attack
• 63 bits of source (MAC, VLAN, misc) creates 17 Bits of hash value and it
will get stored in the CAM table.
• In a Cisco Catalyst 5650, we can store appox. 131,000 CAM entries
• Dsniff macof tool can create 1,55,000 MAC entries in a minute.
15. How to overcome this attack?
We can overcome this attack by enabling switch port security such as
1. Static Secure MAC Addresses
2. Dynamic Secure MAC addresses
3. Sticky secure MAC addresses.
Cisco# conf t
Cisco(config)# interface fastethernet0/1
Cisco(config-if)# switchport mode access
Cisco(config-if)# switchport port-security
Cisco(config-if)# switchport port-security maximum 5
Cisco(config-if)# switchport port-security violation restrict
Cisco(config-if)# switchport port-security mac-address aaaa.aaaa.aaaa
Cisco(config-if)# switchport port-security mac-address bbbb.bbbb.bbbb
Limitations:
1. A secure port can’t be a SPAN port
2. A secure port cannot be an 802.1X port.
3. A secure port cannot belong to an EtherChannel port-channel interface.
16.
17. What is mean by Trunk Port?
• Trunk port have access to all the VLANs by default.
• It used to route traffic of multiple VLANs across the same physical link.
• Encapsulation can be 802.1Q or ISL (Cisco preparatory)
18. Rogue Trunk / Switch Spoof attack
1. A computer can spoof as a switch with 802.1Q or ISL signaling.
2. DTP signaling is required.
3. Requires trunking favorable setting on the switch port.
19. Double encapsulated VLAN attack
1. Attacker sends double tagged 802.1Q frames
2. Switch can perform only one level of decapsulation, so the frame will be
forwarded as per the second tag.
3. VLAN hopping occurs
21. Security practices to avoid the attacks
•
•
•
•
Always use dedicated VLAN ID for all trunk ports
Disable Unused ports and put them on unused VLANs
Don’t use VLAN1 for anything
Set DTP off
22.
23. ARP recall
An ARP request message
should be placed in a frame
and broadcast to all
computers on the network
Each computer receives the
request and examines the
IP address
The computer mentioned in
the request sends a
response; all other
computers process and
discard the request without
sending a response
24. Gratuitous ARP
Gratuitous ARP is used by hosts to announce their IP address to the local
network and avoid duplicate IP addresses on the network; routers and
other network hardware may use cache information gained from
gratuitous ARPs
25. ARP Spoofing
• ARP has no security on IP / MAC addresses
• Host W broadcasts I’m 1.2.3.1 with MAC 12:34:56:78:9A:BC in regular interval
• When the host x requests the MAC of gateway, it will be overwritten by the
gratuitous ARP packet
Even a static ARP entry for 1.2.3.1 on Y will get overwritten by the
Gratuitous ARP on some Oss.
28. ARP Spoof Mitigation
•
•
•
•
Some IDS systems will watch for an unusually high amount of ARP traffic
ARPWatch, AntiARP tools are available to avoid ARP spoofing
Static ARP on critical systems
ARP firewall feature is implemented in some Cisco devices.
29.
30. STP Basics
STP is used to avoid loops and broadcast storms
Messages are sent using Bridge Protocol Data Units (BPDUs). Basic messages
include: configuration, topology change notification/acknowledgment. (TCN/TCA)
31. Standard 802.1d STP takes 30-45 seconds to
deal with a failure or Root bridge change.
Sending BPDUs from the attacker can force
these changes and create a root bridge
change.
35. DHCP Starvation Attack
• This attack performing by broadcasting number of DHCP requests by spoofed
source MAC
• If enough request flooded onto the network, the attacker can completely
exhaust the address space allocated by the DHCP servers for an indefinite period
of time.