Curriculum
Course: CompTIA-Network+ (includes Official Labs)
Login

Curriculum

CompTIA-Network+ (includes Official Labs)

Module 2

0/44

Module 4

0/44

Module 5

0/42
Text lesson

Lesson 9.3 Spoofing Attacks

 Spoofing Attacks

Spoofing encompasses a very wide variety of attack types. When considering threats to the network, it is helpful to use the OSI model to determine what vulnerabilities and potential exploits exist at different layers. Spoofing attacks that corrupt forwarding at layer 2 (Data Link) can have substantial impact and be difficult to mitigate. 

As you study this lesson, answer the following questions: 

  • What are the impacts to the network from on-path spoofing attacks?
  • What are some common attacks that use MAC and ARP spoofing or flooding? 
  • How can a MAC address be spoofed if it is hard coded on the NIC? 
  • How can an attacker manipulate an ARP cache to redirect frames to capture all outbound data? 
  • How can an attacker manipulate VLANs to gain access that wouldn’t normally be permitted?