19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

148<br />

Part III: Hacking Network Hosts<br />

Figure 8-13:<br />

ARP poisoning<br />

results<br />

in Cain &<br />

Abel.<br />

10. Ctrl+click all the hosts in the right column that you want to poison.<br />

11. Click OK and the ARP poisoning process starts.<br />

This process can take anywhere from a few seconds to a few minutes<br />

depending on your network hardware and each hosts’ local TCP/IP<br />

stack. The results of ARP poisoning on my test network are shown in<br />

Figure 8-13.<br />

12. You can use Cain & Abel’s built-in passwords feature to capture passwords<br />

traversing the network to and from various hosts simply by<br />

clicking the Passwords tab.<br />

The preceding steps show how easy it is to exploit a vulnerability and prove<br />

that Ethernet switches aren’t all they’re cracked up to be from a security<br />

perspective.<br />

MAC address spoofing<br />

MAC address spoofing tricks the switch into thinking your computer is something<br />

else. You simply change your computer’s MAC address and masquerade<br />

as another user.<br />

You can use this trick to test access control systems, such as your IPS/firewall,<br />

and even your operating system login controls that check for specific<br />

MAC addresses.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!