Mac Flooding Attack
Today we are seeing about mac-flooding attack based on the below topology.
As per the Topology, IP addresses are assigned to the devices.
All the devices are able to ping each other as they are in the same subnet and no restriction to ping is configured.
Now from the Hacker device, we are going to run the execution of the below command in the command prompt for mac-flooding into the switch.
- macof -i eth0
macof --> application that we are running in the machine.
-i --> specifies the interface
eth0 --> interface name
Below is what you will see on executing the command,
Switch is not accessible after executing the above command.
If you look into switch mac address count, you can see that switch mac-address count is more than 30,000
Since the Mac address was flooded into the switch in a short span of time, resources are utilized for that and the switch will not do other processes that are required to make the network UP.
You can also watch the video in Tamil Language:
Thanks for reading the post.
Post a Comment
Post a Comment