- MAC flooding
In
computer networking , MAC flooding is a technique employed to compromise the security ofnetwork switch es.Switches maintain a list (called a CAM (Content Addressable Memory) Table) that maps individual
MAC address es on the network to the physical ports on the switch. This enables it to only send data out of the physical port where the recipient computer is located, instead of indiscriminately broadcasting the data out of all ports like a hub. The advantage of this method is that data is only routed to the computer that the data is specifically destined for.In a typical MAC flooding attack, a switch is flooded with packets, each containing different source
MAC address es. The intention is to consume the limited memory set aside in the switch to store the MAC address-to-physical port translation table.The result of this attack causes the switch to enter a state called failopen mode, in which all incoming packets are broadcast out on all ports (as with a hub), instead of just down the correct port as per normal operation. A malicious user could then use a
packet sniffer (such asWireshark ) running inpromiscuous mode to capture sensitive data from other computers (such as unencrypted passwords, e-mail andinstant messaging conversations), which would not be accessible were the switch operating normally.Some more advanced switches, such as those from
Nortel ,Cisco orAllied Telesis gives you an opportunity to set up protection against this attack with limiting and/or hardwiring some MAC addresses to a dedicated port. You can also set the policy that if a port gets too many MAC addresses, the default is to shut the port down, and generate a log message.ee also
*
ARP spoofing , a technique which can also facilitate packet sniffing on switches.
Wikimedia Foundation. 2010.