homework_4

homework_4 - Jose Ortiz Jr. IT 430 Homework 4 April 7, 2009...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Jose Ortiz Jr. IT 430 Homework 4 April 7, 2009 1) Discuss two ways to determine which ports are allowed through a firewall and which ports are filtered in the context of a penetration test. 2) Discuss several methods used to bypass a firewall in the context of a penetration test. 3) Describe the two categories of intrusion detection systems and how these systems can be circumvented in the context of a penetration test. 4) Discuss how MAC table flooding and ARP attacks can be used to attack network switches during a penetration test. With MAC table flooding, MAC addresses are stored in content addressable memory (CAM), which is 128 K of reserved memory to store MAC addresses for quick lookup. If a malicious hacker can flood CAM, he can cause the switch to begin flooding traffic everywhere, opening the door to man-in-the-middle (MITM) attacks or, even worse, crashing the switch in a DoS attack. ARP requests are sent out as broadcasts so that all hosts receive the request. A malicious hacker can send a spoofed ARP reply to capture
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/09/2009 for the course CS 431,430,48 taught by Professor Scher,statica during the Spring '09 term at NJIT.

Page1 / 2

homework_4 - Jose Ortiz Jr. IT 430 Homework 4 April 7, 2009...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online