Difference between revisions of "Layer 2 Security Workshop"
Jump to navigation
Jump to search
Sara.alamin (talk | contribs) (→Requirements) |
Sara.alamin (talk | contribs) |
||
(7 intermediate revisions by the same user not shown) | |||
Line 16: | Line 16: | ||
==Date & Time== | ==Date & Time== | ||
− | * Date: Saturday, | + | * Date: Saturday, x.x.x |
* Time: 9:00 to 15:30 | * Time: 9:00 to 15:30 | ||
==Outlines== | ==Outlines== | ||
− | + | # Why L2 Security. | |
+ | # Switching review. | ||
+ | #* How switch work? | ||
+ | #*Switch weakness. | ||
+ | #Sniffing Techniques | ||
+ | #* Packet Sniffers | ||
+ | #* PCAP and promiscuous mode. | ||
+ | #* Sniffing Tools. | ||
+ | #* Active and Passive Sniffing. | ||
+ | #L2 Attacks and Defenses | ||
+ | #* Mac table Flooding. | ||
+ | #* ARP attack. | ||
+ | ## Introduction. | ||
+ | ## When ARP is used? | ||
+ | ## Types of ARP message. | ||
+ | ## Example use of ARP. | ||
+ | ## ARP cache. | ||
+ | ## RARP. | ||
+ | ## ARP Types. | ||
+ | ## ARP Attacks. | ||
+ | ## ARP Spoofing. | ||
+ | ## ARP Denial of Service. | ||
+ | ## Defenses. | ||
+ | ## S-ARP. | ||
+ | ## Conclusion. | ||
+ | # DHCP attack | ||
+ | #* How DHCP Work. | ||
+ | #* DHCP Spoofing Attack. | ||
+ | #* DHCP Starvation Attack. | ||
+ | #* Defenses. | ||
+ | #* Conclusion. | ||
+ | #Some Guides to Minimum Security Baseline for any organization. | ||
==Registration== | ==Registration== | ||
+ | ''Registration link will be here'' |
Latest revision as of 12:44, 16 February 2020
LAN network protection is generally neglected, which is a high risk to the organization or company This Workshop will help you understand L2 vulnerabilities. By the end of this Workshop, you will gain real-world practical skills necessary for LAN security, this workshop is suitable for all interested in cybersecurity, Network Security and Penetration Testing.
Workshop Level
Intermediate level
Instructor
Mohanned Adil Omer
Requirements
- Participants must have a good knowledge about networking, TCP/IP and IP addressing; also know the basic knowledge of Linux.
- Participants must have a Good understanding of switching behavior and protocols.
- Participants should understanding network services (DHCP, DNS, AD ... etc.).
- Participants should bring a laptop computer to participate in the lab, with 4GB RAM as minimum.
Date & Time
- Date: Saturday, x.x.x
- Time: 9:00 to 15:30
Outlines
- Why L2 Security.
- Switching review.
- How switch work?
- Switch weakness.
- Sniffing Techniques
- Packet Sniffers
- PCAP and promiscuous mode.
- Sniffing Tools.
- Active and Passive Sniffing.
- L2 Attacks and Defenses
- Mac table Flooding.
- ARP attack.
- Introduction.
- When ARP is used?
- Types of ARP message.
- Example use of ARP.
- ARP cache.
- RARP.
- ARP Types.
- ARP Attacks.
- ARP Spoofing.
- ARP Denial of Service.
- Defenses.
- S-ARP.
- Conclusion.
- DHCP attack
- How DHCP Work.
- DHCP Spoofing Attack.
- DHCP Starvation Attack.
- Defenses.
- Conclusion.
- Some Guides to Minimum Security Baseline for any organization.
Registration
Registration link will be here