
545454
© 2002, Cisco Systems, Inc. All rights reserved.
l2-security-bh.ppt
BB
F
F
Spanning Tree Attack Example 2/2
¥ Send BPDU messages to become
root bridge
Attacker
Access Switches
Root
Root
F
F
F
F
F
F
F
F
F
F
Root
Root
BB
X
X
The attacker then sees frames he
shouldnÕt
MITM, DoS, etc. all possible
Any attack is very sensitive to
the original topology, trunking,
PVST, etc.
Although STP takes link speed
into consideration, it is always
done from the perspective of the
root bridge. Taking a Gb
backbone to half-duplex 10 Mb
was verified
Requires attacker is dual homed to
two different switches (with a hub,
it can be done with just one
interface on the attacking host)
Commentaires sur ces manuels