Mac Flooding Attack

Mac Flooding Attack


Today we are seeing about mac-flooding attack based on the below topology.

As per the Topology, IP addresses are assigned to the devices.

All the devices are able to ping each other as they are in the same subnet and no restriction to ping is configured.

Now from the Hacker device, we are going to run the execution of the below command in the command prompt for mac-flooding into the switch.
  •     macof -i eth0
macof  --> application that we are running in the machine.
-i --> specifies the interface
eth0 --> interface name


Below is what you will see on executing the command,

Kali


Switch is not accessible after executing the above command.
VPC

Let's stop the executed command in Hacker device and check the switch whether accessible.
VPC


If you look into switch mac address count, you can see that switch mac-address count is more than 30,000


Since the Mac address was flooded into the switch in a short span of time, resources are utilized for that and the switch will not do other processes that are required to make the network UP.


You can also watch the video in Tamil Language:


Thanks for reading the post.

Post a Comment