Penetration Testing With Kali Linux
Penetration Testing With Kali Linux
- Apurva Varalikar
- Jugal Shah
- Omkar Dhomane
- Omkar Salunkhe
Attacks Implemented
3. DNS spoofing
4. Session Hijacking
Taking over HSRP
Topology
Attack Description
● The malicious entity assumes the role of the active device by
increasing its own priority value and overthrowing the existing
active device.
● On launching the attack, the kali host becomes the root with all of its
ports becoming designated ports.
● Root Guard:
This feature helps control where root bridges can be connected.
● BPDU Guard:
● Concept of Portfast
This feature is enabled by default when Portfast is enabled and helps avert
the possibility of a rogue switch becoming the root.
CDP Flooding Attack
Topology
Attack Description
• CDP is a Cisco proprietary protocol which allows Cisco devices to
announce and share information to their neighboring devices. These
messages contain detailed information about themselves, such as the
software version, IP address, platform, capabilities, and the
native VLAN.
One way to obviate a CDP flood attack is to disable CDP on the entire switch:
● IP-dependent log in
● DNSSEC
Thank You!
Any Questions?