Layer 2 Security Workshop
LAN network protection is generally neglected, which is a high risk to the organization or company This Workshop will help you understand L2 vulnerabilities. By the end of this Workshop, you will gain real-world practical skills necessary for LAN security, this workshop is suitable for all interested in cybersecurity, Network Security and Penetration Testing.
Contents
Workshop Level
Intermediate level
Instructor
Mohanned Adil Omer
Requirements
- Participants must have a good knowledge about networking, TCP/IP and IP addressing; also know the basic knowledge of Linux.
- Participants must have a Good understanding of switching behavior and protocols.
- Participants should understanding network services (DHCP, DNS, AD ... etc.).
- Participants should bring a laptop computer to participate in the lab, with 4GB RAM as minimum.
Date & Time
- Date: Saturday, x.x.x
- Time: 9:00 to 15:30
Outlines
- Why L2 Security.
- Switching review.
- How switch work?
- Switch weakness.
- Sniffing Techniques
- Packet Sniffers
- PCAP and promiscuous mode.
- Sniffing Tools.
- Active and Passive Sniffing.
- L2 Attacks and Defenses
- Mac table Flooding.
- ARP attack.
- Introduction.
- When ARP is used?
- Types of ARP message.
- Example use of ARP.
- ARP cache.
- RARP.
- ARP Types.
- ARP Attacks.
- ARP Spoofing.
- ARP Denial of Service.
- Defenses.
- S-ARP.
- Conclusion.
- DHCP attack
- How DHCP Work.
- DHCP Spoofing Attack.
- DHCP Starvation Attack.
- Defenses.
- Conclusion.
- Some Guides to Minimum Security Baseline for any organization.
Registration
Fees
This workshop is Free!
Seats are limited.