02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Switched Network Sniffing 227<br />

Port Mirror or SPAN Port<br />

Another way to circumvent switches is through the use of physical means—getting physical<br />

access to the switch and using port mirroring or a Switched Port Analyzer (SPAN) port.<br />

This technique is used to send a copy of every network packet encountered on one switchport<br />

or a whole VLAN to another port where it may be monitored. This functionality is<br />

used to monitor network traffic either for diagnostic purposes or for the purpose of implementing<br />

devices such as network intrusion detection systems (NIDSs).<br />

On the Defensive<br />

As an ethical hacker, your work could very likely put you in a position of prevention rather<br />

than pen testing. Based on what we’ve covered so far in this chapter, what you know as an<br />

attacker can help you prevent the very techniques you employ from the outside in. Here are<br />

defenses against the attacks we just covered from a pen tester’s perspective:<br />

■<br />

■<br />

■<br />

■<br />

■<br />

Use a hardware-switched network for the most sensitive portions of your network in<br />

an effort to isolate traffic to a single segment or collision domain.<br />

Implement IP DHCP Snooping on switches to prevent ARP-poisoning and spoofing<br />

attacks.<br />

Implement policies preventing promiscuous mode on network adapters.<br />

Be careful when deploying wireless access points, knowing that all traffic on the<br />

wireless network is subject to sniffing.<br />

Encrypt your sensitive traffic using an encrypting protocol such as SSH or IPSec.<br />

Technologies such as SSL and IPSec are designed not only to keep traffic<br />

from being altered, but also to prevent prying eyes from seeing traffic they<br />

shouldn’t.<br />

■<br />

■<br />

■<br />

■<br />

■<br />

■<br />

Here are other methods of hardening a network against sniffing:<br />

Static ARP entries, which consist of preconfiguring a device with the MAC addresses<br />

of devices that it will be working with ahead of time. However, this strategy does not<br />

scale well.<br />

Port security is used by switches that have the ability to be programmed to allow only<br />

specific MAC addresses to send and receive data on each port.<br />

IPv6 has security benefits and options that IPv4 does not have.<br />

Replacing protocols such as FTP and Telnet with SSH is an effective defense against sniffing.<br />

If SSH is not a viable solution, consider protecting older legacy protocols with IPSec.<br />

Virtual private networks (VPNs) can provide an effective defense against sniffing due<br />

to their encryption aspect.<br />

SSL is a great defense along with IPSec.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!