Options

Switch Attack

Okay, so having a brainfart here. There is an attack that helps you monitor traffic on a switch by overloading the flash memory of a switch with port and MAC address associations. The switch then reacts to the memory overload by beginning to broadcast all traffic. I can't remember what this is called. Anybody???

Comments

  • Options
    kriscamaro68kriscamaro68 Member Posts: 1,186 ■■■■■■■□□□
    Broadcast storm? Thats what is coming to my mind.
  • Options
    busines4ubusines4u Member Posts: 67 ■■□□□□□□□□
    I think you are referencing a MAC Flooding attack. This will consume all of the CAM table entries and thus will turn the switch into a hub sending all incoming frames out of all ports.
  • Options
    paul78paul78 Member Posts: 3,016 ■■■■■■■■■■
    MAC Flooding. Its a type of ARP cache poison attack.
  • Options
    JDMurrayJDMurray Admin Posts: 13,031 Admin
    MAC flooding is not cache poisoning. Sending unsolicited ARP RESPONSE messages with bad information is an ARP cache poisoning attack or ARP Spoofing attack. MAC flooding is overwhelming a switch with many frames with different MAC addresses to get the switch to exceed its CAM table buffer space and fail-over to broadcast mode to keep network traffic flowing. A switch's response to MAC flooding is therefore "not a bug, but a feature."
  • Options
    dmoore44dmoore44 Member Posts: 646
    I get the basic premise of the attack, but I have no practical experience with relation to a MAC flood... So, my question is this: at what point does the switch recover? Does an attacker need to continue flooding a switch with MACs in order to keep the switch in broadcast mode? Does a switch auto-recover from a MAC flood, or does a network admin need to pull the plug and reboot it?
    Graduated Carnegie Mellon University MSIT: Information Security & Assurance Currently Reading Books on TensorFlow
  • Options
    chaser7783chaser7783 Member Posts: 154
    Went to a talk @ Defcon one year where they talked about VLAN layer 2 attacks and MAC floodding.
    Here is the link to the pdf about the presentation. Starts on pg.10 MAC Flooding/CAM table overflow attack:

    https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-figueroa-williams.pdf
  • Options
    MickQMickQ Member Posts: 628 ■■■■□□□□□□
    I would assume it would recover when the MACs are timed out of the CAM. That is assuming that none have since been learned by the switch.
  • Options
    the_hutchthe_hutch Banned Posts: 827
    Yes, MAC flood is what I was referring to. Thank you all. I just got ahold of a Cisco Catalyst 4006 36-port switch and wanted to try this soon.
  • Options
    JDMurrayJDMurray Admin Posts: 13,031 Admin
    It will be interesting to see how many ports need to be flooded before it changes to broadcast. For max fault tolerance, I would assume only one.
  • Options
    dmoore44dmoore44 Member Posts: 646
    chaser7783 wrote: »
    Went to a talk @ Defcon one year where they talked about VLAN layer 2 attacks and MAC floodding.
    Here is the link to the pdf about the presentation. Starts on pg.10 MAC Flooding/CAM table overflow attack:

    https://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-figueroa-williams.pdf

    Cool - thanks for the heads up. I'll give the document a look a little later tonight.
    Graduated Carnegie Mellon University MSIT: Information Security & Assurance Currently Reading Books on TensorFlow
  • Options
    docricedocrice Member Posts: 1,706 ■■■■■■■■■■
    I've heard referred to it as CAM table overflowing. Port-security on Cisco switches (and whatever it's called on other vendors of managed switches) should help mitigate this. I'd say try it on a dumb switch for easier results.
    Hopefully-useful stuff I've written: http://kimiushida.com/bitsandpieces/articles/
  • Options
    quinnyflyquinnyfly Member Posts: 243 ■■■□□□□□□□
    the_hutch wrote: »
    Okay, so having a brainfart here. There is an attack that helps you monitor traffic on a switch by overloading the flash memory of a switch with port and MAC address associations. The switch then reacts to the memory overload by beginning to broadcast all traffic. I can't remember what this is called. Anybody???

    I'd say MAC flooding, especially if the switches is in promiscuous mode? Sounds like a kind of buffer overflow causing a DoS. Just a stab in the dark straight out of bed and still scratchin my head!
    The Wings of Technology
  • Options
    the_hutchthe_hutch Banned Posts: 827
    Not really for DOS. More of an active sniffing attack
  • Options
    JDMurrayJDMurray Admin Posts: 13,031 Admin
    Yep, nothing is getting blocked or denied, but the increased bandwidth usage from the frame flooding will lag the network quite a bit. And yes, it makes sniffing a lot easier too.
  • Options
    bryguybryguy Member Posts: 190
    docrice wrote: »
    I've heard referred to it as CAM table overflowing. Port-security on Cisco switches (and whatever it's called on other vendors of managed switches) should help mitigate this. I'd say try it on a dumb switch for easier results.

    Think you can also use "switchport block unicast" command which will drop the frame once the CAM table is full, as opposed to flooding it out all ports. Not sure if, with the latest IOS if this is on by default, so you may want to turn it off if you're intentially trying to perform a MAC flooding attack, in order to sniff the traffic.
  • Options
    chaser7783chaser7783 Member Posts: 154
    could you not also use the mac-address-table learning command to limit the amount of mac address learned per port to mitigate a CAM table overflow?
  • Options
    chaser7783chaser7783 Member Posts: 154
    Also found this white paper MAC Address Overflow Attack and Mitigation Techniques* [Cisco Catalyst 6500 Series Switches] - Cisco Systems
    They talk about MAC address monitoring in the summary,
    MAC address monitoring is a feature present on Cisco Catalyst 6500 Series switches. This feature helps mitigate MAC address flooding and other CAM overflow attacks by limiting the total number of MAC addresses learned by the switch on per-port or per-VLAN basis. With MAC Address Monitoring, a maximum threshold for the total number of MAC addresses can be configured and enforced on a per-port and/or per-VLAN basis. MAC address monitoring in Cisco IOS Software allows the definition of a single upper (maximum) threshold. In addition, the number of MAC addresses learned can only be monitored on a per-port or per-VLAN basis, and not a per-port-per-VLAN. By default, MAC address monitoring is disabled in Cisco IOS Software. However, the maximum threshold for all ports and VLANs is configured to 500 MAC address entries, and when the threshold is exceeded the system is set to generate a system message along with a syslog trap. These default values take effect only when MAC address monitoring is enabled. The system can be configured to notify or disable the port or VLAN every time the number of learned MAC addresses exceeds the predefined threshold. In our test, we used the "mac-address-table limit" command on the access layer port interface to configure the MAC address monitoring feature.
  • Options
    JDMurrayJDMurray Admin Posts: 13,031 Admin
    That feature allows the switch to drop traffic, rather than failing over to "hub mode," as a configuration choice made by the customer.
Sign In or Register to comment.