Network Security – Hub or Switch?



So, for those that have a little bit of knowledge about network hardware, you’ve probably heard this. “You can’t sniff switched networks”…. wrong…. let’s see what this is about. Older networking hardware was dominated by what’s called a hub. This was basically a “dumb” device that when it received data, it would retransmit the data to every machine connected with the expectation that the correct recipient would answer and all others would ignore that data. Of course, this stream of data is possible to watch and easily available software could log all network traffic fairly easily.


So, anything that is unencrypted could be captured and analyzed by any machine hooked up to a hub. But switches were supposedly smarter and some still think that a switch prevents network sniffing. A switch is supposed to know which machines are connected to which ports. So, data destined for machine A ONLY goes to machine A. This knowledge of what machine is where relies upon MAC addressing. So, this is susceptible to a number of attacks.

First, using easily available software, an attacking machine could flood the switch with bogus (false) MAC addresses, at which point the switch will likely give up and fallover to “hub” mode. Also, it’s possible to change the mac address of a network interface. This is another fairly easily available attack. The idea is that you duplicate the MAC address of the “target machine” and then both machines receive the same data from the switch.

There’s yet another approach though that has more interesting possibilities in the area of risk though. That is something called ARP spoofing (or arp poisoning.)

So, in short, switched networks can easily be sniffed.

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security - Arp spoofing So.... what is arp spoofing (poisoning).... and what are it's implications? ARP spoofing involves tricking a machine into thinking that you're machine is, yet another. Let's put this in IP address terms. Let's say that 192.168.0.1 is the default gatway on the network and 192.168.0.150 is our target. We are......
  • SSH, Proxies (Proxy's?), Tor and Web Browsing For quite some time I've been making use of a dd-wrt modified linksys box on my home network as an openvpn endpoint so that when I'm out and about in the world, I connect the vpn, switch firefox to route through a squid proxy server on the home network and......
  • Network Security guide for the home or small business network - Part 7 - Wireless Networking OK - the last couple of entries got into some heavy lifting and some real learning on your part. Learning about what software needs to run, what services are running, updating them to keep current on security patches. We even talked about securing services listening for outside connections and limiting......
Blog Traffic Exchange Related Websites
  • Tools to Analyze Our Retirement Portfolio I admit to being somewhat obsessive in trying to find ways to analyze the different investments in our retirement portfolio.¬† My particular interest is, of course, portfolio survival:¬† Will our retirement investments¬†provide a steady and reliable income so that we will not outlive our money. Many other baby boomers are......
  • Make Free Phone Calls Anywhere in the USA with Google Voice, Gizmo, and Asterisk Update: The instructions here are no longer valid, because Google has since closed off inbound SIP calls into Google Voice. However, I have posted a new solution for making free phone calls with Google Voice, Gizmo, and Asterisk. I recently switched my GrandCentral account over to Google Voice. I fooled......
  • Personal Security on Social Networking Sites Visits to social networking sites account for more than 10% of the total time people spend on the Internet, according Nielsen Online. A social network site focuses on building online communities of people who share common interests and activities, such as Linkedin.com and Facebook.com. Facebook is now the most visited......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site