Description: In computer networking, MAC flooding is a technique employed to compromise the security of network switches.
Switches maintain a CAM Table that maps individual MAC addresses on the network to the physical ports on the switch. This allows the switch to direct data out of the physical port where the recipient is located, as opposed to indiscriminately broadcasting the data out of all ports as a hub does. The advantage of this method is that data is bridged exclusively to the network segment containing the computer that the data is specifically destined for.
Credits : http://en.wikipedia.org/wiki/MAC_flooding
This video is simple demo of MAC flood attack to Cisco layer 3 switch. In the video attacker is on vlan 20. there are group of users on vlan 20 and vlan 10. Attacker flood this switch with mac addresses until CAM table overflows. When this happens switch starts work as hub and send the packets to all port. At this point attacker starts sniffing the connection and try to find communication between hosts and servers.
Source : Cipherex01 from Youtube
Tags: cisco , mac_flood_attack ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.