Switch Attacks: MAC Flooding, ARP Spoofing & More

Learn about common switch-based attacks like MAC flooding, ARP spoofing, VLAN hopping, and how to protect your network. πŸ”

Switch Attacks: MAC Flooding, ARP Spoofing & More
Cyberconnect
23.5K views β€’ Oct 11, 2024
Switch Attacks: MAC Flooding, ARP Spoofing & More

About this video

In this video, we break down the top switch-based attacks that threat actors use to exploit network infrastructures. If you manage or design networks, understanding these Layer 2 threats is crucial.

πŸ” What you’ll learn:

MAC Flooding: How attackers overflow the switch’s CAM table to force traffic to broadcast.

ARP Spoofing: How fake ARP responses can poison a network and enable man-in-the-middle attacks.

VLAN Hopping: Techniques attackers use to jump across VLAN boundaries and access unauthorized segments.

MAC Spoofing & STP Manipulation: How impersonating devices and modifying spanning tree priorities can compromise your topology.

We also cover:
βœ… How each attack works (visual breakdowns)
βœ… Real-world use cases and what attackers are targeting
βœ… Best practices to mitigate and defend against these threats
βœ… Tools used to simulate or test these attacks for educational purposes

Whether you're studying for Network+, Security+ or just want to harden your network, this is must-know knowledge for defending the edge of your infrastructure.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

23.5K

Likes

1.1K

Duration

10:24

Published

Oct 11, 2024

User Reviews

4.6
(4)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.

Trending Now