

Example 3-41, earlier in the chapter, displays how this can be achieved. To start with, you must enable port security. Mitigating this form of attack takes a little more design because the attacker is far more intelligent.
How to spoof mac address on a mac manual#
By ensuring that any ARP requests are replied to, the intruder can maintain the connection until manual intervention occurs from the network administrator. Until Device A resends packets, the data flow will remain and the attacker will receive and view active data. Now when Device B wishes to communicate to the legitimate Device A, the switch sends the packet according to the CAM table, which is now Port 3 or the attacking PC.

The switch relearns the MAC address and changes the CAM table entries in Step 2 of the attack. After spoofing the MAC address of Device A (remember, the initial frame when a CAM table is empty is sent to all ports except the source port), Device C sends out a frame with the source address of MAC A, with a new spoofed IP address. Step 1 in Figure 3-9 demonstrates the three discovered devices (Devices A, B, and C) in the CAM table. This is best illustrated in Figure 3-9.ĬAM Table Port 1 Empty Port 2 B Port 3 AC This enables the spoofed CAM entry on the switch to be overwritten as well. This provides the intruder valuable details about applications in use and destination host IP addresses. The intruder then presents itself as the default gateway and copies all of the data forwarded to the default gateway without being detected. A MAC spoofing attack is where the intruder sniffs the network for valid MAC addresses and attempts to act as one of the valid MAC addresses.
