Layer 2 Security Workshop
Jump to navigation
Jump to search
LAN network protection is generally neglected, which is a high risk to the organization or company This Workshop will help you understand L2 vulnerabilities. By the end of this Workshop, you will gain real-world practical skills necessary for LAN security, this workshop is suitable for all interested in cybersecurity, Network Security and Penetration Testing.
Workshop Level
Intermediate level
Instructor
Mohanned Adil Omer
Requirements
- Participants must have a good knowledge about networking, TCP/IP and IP addressing; also know the basic knowledge of Linux.
- Participants must have a Good understanding of switching behavior and protocols.
- Participants should understanding network services (DHCP, DNS, AD ... etc.).
- Participants should bring a laptop computer to participate in the lab, with 4GB RAM as minimum.
Date & Time
- Date: Saturday, x.x.x
- Time: 9:00 to 15:30
Outlines
- Why L2 Security.
- Switching review.
- How switch work?
- Switch weakness.
- Sniffing Techniques
- Packet Sniffers
- PCAP and promiscuous mode.
- Sniffing Tools.
- Active and Passive Sniffing.
- L2 Attacks and Defenses
- Mac table Flooding.
- ARP attack.
- Introduction.
- When ARP is used?
- Types of ARP message.
- Example use of ARP.
- ARP cache.
- RARP.
- ARP Types.
- ARP Attacks.
- ARP Spoofing.
- ARP Denial of Service.
- Defenses.
- S-ARP.
- Conclusion.
- DHCP attack
- How DHCP Work.
- DHCP Spoofing Attack.
- DHCP Starvation Attack.
- Defenses.
- Conclusion.
- Some Guides to Minimum Security Baseline for any organization.
Registration
Registration link will be here