![]() ![]() ![]() Typical MAC flooding involves flooding a switch with numerous requests with different fake source MAC address. The technique used to compromise a switched network based on limited storage is called MAC flooding. But, it can still be compromised by the fact that switches have limited memory to store MAC address tables and turn into hubs when flooded with MAC address beyond their storage. Thus, a switched network is more secure when compared to hub Network. Unlike a hub, which broadcasts the data across the network, the switch sends data only to the intended recipient. These switches map individual MAC addresses on the network to the physical ports on the switch through the means of a CAM table. It is a technique used to compromise the security of network switches that connect network segments or network devices. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |