Attack 4: Simulating a Dual-Homed Switch

Attack 4: Simulating a Dual-Homed Switch

Yersinia can booty advantage of computers able with two Ethernet cards to masquerade

as a dual-homed switch. This adequacy introduces an absorbing traffic-redirection attack,

as Figure 3-7 shows.

64 Chapter 3: Attacking the Spanning Tree Protocol

Figure 3-7 Simulating a Dual-Homed Switch

In Figure 3-7, a hacker connects to switches 1 and 4. It again takes basis ownership, creating

a new cartography that armament all cartage to cantankerous it. The burglar could alike force switches 1

and 4 to accommodate the conception of a block anchorage and ambush cartage for added than one VLAN.

Again, BPDU-guard stands out as the best advantageous band-aid to avert the attack.