Ethical Hacking Unit 2 - Installation and Tools
Ethical Hacking Unit 2 - Installation and Tools
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Reconnaissance
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Reconnaissance
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Reconnaissance
Active Scanning
Active scanning is a type of network scanning technique that is used to
gather information about a target system or network.
Which only gathers information that is readily available, active scanning
actively interacts with the target system to gather information.
Passive Scanning
Passive scanning is a type of network scanning technique that is used to
gather information about a target system or network without actively
interacting with the target.
Which sends requests or packets to the target and analyzes the responses,
passive scanning only gathers information that is readily available, such as
information transmitted over the network or stored in system logs.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Reconnaissance
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Reconnaissance
User Enumeration:
User enumeration is an important phase in penetration testing
that entails identifying valid user names on a company’s
network and attempting to use each of these usernames and
passwords until they are able to gain unauthorized access to
the system
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Reconnaissance
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Reconnaissance
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Reconnaissance
Active Reconnaissance
In this process, you will directly interact with the computer
system to gain information. This information can be relevant and
accurate. But there is a risk of getting detected if you are planning
active reconnaissance without permission. If you are detected, then
system admin can take severe action against you and trail your
subsequent activities.
Passive Reconnaissance
In this process, you will not be directly connected to a computer
system. This process is used to gather essential information without
ever interacting with the target systems.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Reconnaissance
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Reconnaissance
RECONNAISSANCE
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - WHOIS Database Looker
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - WHOIS Database Looker
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - WHOIS Database Looker
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - WHOIS Database Looker
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - WHOIS Database Looker
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - WHOIS Database Looker
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NETCRAFT
Netcraft
Netcraft is an internet service company based in
England. Using this service one can find the list of sub
domain and the operating system of the corresponding
server.
https://sitereport.netcraft.com/
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NETCRAFT
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NETCRAFT
𝑤𝑤𝑤. 𝑎𝑟𝑐ℎ𝑖𝑣𝑒.org
History of the website; it is very easy to get a complete history of any
website using
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Site Operator
SITE OPERATOR; site operator has been used to limit the result
for a particular site. For example, suppose we are going to limit our
search result with only the site 𝑚𝑖𝑐𝑟𝑜𝑠𝑜𝑓𝑡. 𝑐𝑜𝑚. So, now I am opening
my browser and using the site operator.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Advanced Google Search
File Type Operator: You can use the "filetype:" operator to search for specific
file types. In this case, you would use it to find PowerPoint presentations (PPT
files).
Example: filetype:ppt presentation topic
Intitle Operator: The "intitle:" operator helps you find pages where the specified
keyword appears in the title. Example: intitle:presentation topic filetype:ppt
Inurl Operator: The "inurl:" operator lets you search for keywords that appear in
the URL of the page. Example: inurl:presentation-topic filetype:ppt
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Advanced Google Search
Link Operator: You can use the "link:" operator to find pages that
link to a specific URL. Example: link:example.com filetype:ppt
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Advanced Google Search
We can also use intitle search parameter. So, using intitle search parameters, search only in
those page title for a word or phrase, use exact match for pages. So, for example suppose I am
searching intitle.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Advanced Google Search
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Advanced Google Search
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NMAP
Nmap, short for Network Mapper, is a widely used open-source tool for network discovery, mapping,
and security auditing. It provides valuable insights into network topologies, device configurations, and
potential vulnerabilities.
Key Features of Nmap:
1.Network Discovery: Nmap scans networks to identify active hosts, IP addresses, and open ports.
2.Port Scanning: It determines which ports are open, closed, or filtered on target systems.
3.Version Detection: Nmap can identify software and services running on open ports.
4.OS Fingerprinting: It can deduce the operating system of a target based on network responses.
5.Scriptable Interaction: Nmap offers a scripting engine for customizing scans and interactions with
targets.
Use Cases:
1.Network Inventory: Nmap helps create an inventory of devices connected to a network, aiding in
network management.
2.Security Assessment: It identifies potential security vulnerabilities, misconfigurations, and weak
points in the network.
3.Penetration Testing: Nmap is commonly used by ethical hackers to assess the security of a network
from an attacker's perspective.
4.Network Troubleshooting: It assists in diagnosing connectivity issues and mapping network paths.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NMAP
Network scan: It basically detect the live host on the network, port scan
detect the open port on the host, version a service scan detect the
software and the version to the respective service running in any
particular port. OS scan detect operating system, vulnerability scan
detect computers or computer systems or networks or applications for
weakness.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NMAP
Benefits of Nmap:
1.Open Source: Nmap is freely available and actively maintained by a dedicated
community.
2.Cross-Platform: It runs on various operating systems, including Windows, Linux,
and macOS.
3.Customizability: Nmap's extensive options and scripts allow tailored scans for
different purposes.
4.Educational: Nmap is a valuable tool for learning about network protocols and
security concepts.
Security Considerations:
1.Permission: Always ensure you have authorization before scanning networks you
don't own.
2.Legal Compliance: Be aware of laws and regulations governing network scanning in
your jurisdiction.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NMAP
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NMAP
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
Overview of Nessus
•Nessus: Industry-leading vulnerability assessment tool
•Developed by Tenable
•Used to identify and manage security vulnerabilities
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
Nessus Editions
•Free Version: Limited features for personal use
•Paid Editions: Enhanced features for businesses
•Enterprise: Scalability, advanced reporting, integrations
Real-world Use Case
•Financial Institution
• Nessus identified critical vulnerabilities in web application
• Prompt remediation prevented potential data breach
Best Practices
•Regular Scanning: Scheduled assessments for continuous monitoring
•Timely Remediation: Address vulnerabilities promptly
•Integration: Integrate Nessus with existing security tools
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - NESSUS
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Creating a secure hacking environment
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Creating a secure hacking environment
https://www.kali.org/
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Creating a secure hacking environment
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Creating a secure hacking environment
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Creating a secure hacking environment
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - System Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - System Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - System Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - System Hacking
Steps:
1. Reconnaissance: The first step in this type of Hacking is collecting information
regarding the System’s infrastructure, working, system’s network. This step is very
important as after this step the Hacker knows what attack to perform and how to
gain access without leaving a trace.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - System Hacking
2. Scanning: This step involves scanning the target System, which includes:
•Vulnerability Scanning: Checking vulnerabilities in the targeted system that can
be exploited to gain access.
•Mapping of Network: Finding the working of the network, firewalls, routers,
and systems connected to it.
•Port Scanning: Scanning the open ports, and services running over the
System/Server.
3. Gaining Access: This is the phase in which the hacker breaks into the system and
gains unauthorized access to the System/Network and then elevates his privileges
to that of Administrator or SuperUser so he can play with the System files that a
normal/Guest user is unable to access.
4. Maintaining the Access: After the Hacker enters the System he tries to maintain
the connection with it in the background until he accomplishes the goal with which
he entered it.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - System Hacking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Password Cracking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Password Cracking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Password Cracking
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Privilege Escalation Attack
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Privilege Escalation Attack
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Privilege Escalation Attack
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Malware
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Malware
Trojans:
1. Disguised as legitimate software but performs unauthorized actions
2. Often used to create backdoors or steal information
3. Example: Zeus, Emotet
Ransomware:
1. Encrypts user data and demands a ransom for decryption
2. Often delivered through malicious email attachments or links
3. Example: WannaCry, NotPetya
Spyware:
1. Monitors user activity without consent, collects sensitive information
2. Used for espionage, identity theft, and more
3. Example: FinFisher, SpyEye
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - Malware
Prevention Measures:
1.Use Antivirus/Anti-Malware Software:
Regularly update and use reputable security software to detect and remove malware.
2.Keep Software Updated:
Apply security patches and updates for operating systems, applications, and plugins.
3.Practice Safe Browsing:
Avoid clicking on suspicious links or downloading files from untrusted sources.
4.Use Strong Authentication:
Employ strong, unique passwords and consider multi-factor authentication.
5.Be Cautious with Email:
Don't open attachments or click links from unknown or unexpected senders.
6.Backup Data Regularly:
Create backups of important data and keep them offline to prevent ransomware attacks.
7.Educate Users:
Train individuals on recognizing phishing attempts, suspicious links, and downloads.
8.Implement Network Security:
Use firewalls, intrusion detection systems, and network segmentation.
9.Apply Least Privilege Principle:
Limit user and application access to only what's necessary for their roles.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - VIRUS
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - VIRUS
Characteristics:
•Replication: A virus reproduces by embedding its code into
other files or programs, thereby spreading the infection.
•Payload: The virus carries a payload, which is the harmful
action it's programmed to perform, such as data corruption or
unauthorized access.
•Activation: The virus becomes active when the infected
program or file is executed by a user or an automated process.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - VIRUS
Types of Viruses:
1.File Infector Viruses:
1. Infect executable files (e.g., .exe, .dll) and spread when the infected program is run.
2. Examples: CIH (Chernobyl), Sasser
2.Macro Viruses:
1. Infect documents (e.g., Word, Excel) that contain macros, exploiting their automation
features.
2. Examples: Melissa, Concept
3.Boot Sector Viruses:
1. Infect the master boot record of a computer's hard drive or removable media.
2. Activate during system boot-up, affecting the system's startup process.
3. Examples: Stoned, Michelangelo
4.Polymorphic Viruses:
1. Modify their own code or appearance to evade detection by antivirus software.
2. Adapt to changes, making it difficult to identify and remove them.
3. Examples: Storm Worm, Marburg M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - VIRUS
Prevention and Mitigation:
•Use Antivirus Software: Employ reputable antivirus and anti-malware programs to
detect and remove viruses.
•Regular Updates: Keep operating systems, applications, and security software
updated to patch vulnerabilities.
•Download from Trusted Sources: Only download software and files from reputable
websites and sources.
•Be Cautious with Attachments: Avoid opening email attachments from unknown or
suspicious senders.
•Disable Macros: In programs like Microsoft Office, disable macros if not needed.
•Scan Removable Media: Scan USB drives and other external devices for viruses
before use.
•Educate Users: Teach users to recognize potential virus threats and avoid risky
behavior.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - ARP Spoofing Attack
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - ARP Spoofing Attack
Types of ARP Spoofing:
•Man-in-the-Middle: In the Man-in-the-Middle Attack, hackers use ARP
spoofing to intercept communications that occur between devices on a
network to steal information that is transmitted between devices.
Sometimes, hackers also use man-in-the-middle to modify traffic between
network devices.
•Session hijacking: In Session hijacking, With the help of ARP spoofing
hackers are able to easily extract the session ID or gain inauthentic access
to the victim’s private systems and data.
•Denial-of-service attacks: Denial-of-service attack is a type of attack in
which one or more victims deny to access the network. With the help of
ARP spoofing, A single target victim’s mac address is linked with multiple
IP addresses. Due to this whole traffic is shifted toward the target victim’s
mac address which causes overloading of the network of the target victim
with traffic. M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - ARP Spoofing Attack
Working:
•Scanning: Hackers use ARP spoofing tools to scan the IP
and MAC addresses of hosts.
•Selection and Launching: Hackers select their target and
then send ARP packets over the local network containing the
hacker’s MAC address and the target’s IP address.
•Accessing: Once the ARP cache on the host on the local
network is corrupted. Then the data the host wants to send to
the victim is sent to the hacker instead of the victim. Hackers
can steal data or launch other attacks from here.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - ARP Spoofing Attack
Preventive Measure:
•Cryptographic Network Protocols: With the help of encrypted
communication protocols like Transport Layer
Security (TLS), HTTP Secure (HTTPS), and Secure Shell (SSH), We are
able to reduce the chance of an ARP Spoofing attack.
•Packet Filtering: With the help of packet filters, we can protect the
network from maliciously transmitted packets on the network as well
as suspicious IP addresses.
•Virtual Private Network: The most useful preventive measure against
ARP spoofing attacks is to use a VPN (Virtual Private Network).
•ARP Spoofing Detection Software: With the help of ARP Spoofing
Detection Software it is easier to detect ARP spoofing attacks as it
helps in inspecting and certifying data before data is transmitted.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - MAC ATTACK
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - MAC ATTACK
MAC Flooding:
•In a MAC flooding attack, the attacker floods the network switch with a large
number of fake MAC addresses, overwhelming the switch's MAC address
table.
•When the MAC address table is full, the switch starts operating in a "fail-
open" mode, which means it begins to behave like a hub, broadcasting
network traffic to all ports instead of efficiently forwarding traffic.
•This attack can lead to a loss of network performance, and in some cases, it
can facilitate eavesdropping on network traffic.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - MAC ATTACK
MAC Spoofing:
•MAC spoofing involves changing the MAC address of a network device to impersonate
another legitimate device's MAC address.
•This can be used to bypass network access controls that rely on MAC filtering or to conduct
man-in-the-middle attacks.
•For example, an attacker might change their MAC address to match that of an authorized
device to gain unauthorized access to a network.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - MAC ATTACK
MAC Cloning:
•Similar to MAC spoofing, MAC cloning involves copying the MAC address of a
legitimate device and using it on the attacker's system.
•The attacker's goal might be to impersonate the legitimate device to gain network
access or avoid detection.
MAC DoS (Denial of Service):
• In a MAC DoS attack, the attacker continuously sends spoofed MAC frames to a
target's network interface, causing the target device to consume excessive
processing resources.
• This can lead to device slowdowns or even crashes, resulting in a denial of service.
CAM Table Overflow:
• In this attack, an attacker sends a flood of forged MAC address frames to a switch,
causing the switch's Content Addressable Memory (CAM) table to fill up.
• When the CAM table is full, legitimate MAC address mappings may be evicted,
causing network disruption.
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.
20CS5905 - ETHICAL HACKING AND NETWORK DEFENCE - MAC ATTACK
M. Saravanan, AP/CSE
K.Ramakrishnan College of Technology,
Tiruchirappalli.