Questions tagged [data-link-layer]
The data-link-layer tag has no summary.
9 questions
2votes
0answers
73views
Can exponential back-off be abused to "knock off" a station off a network?
In my Cryptography & Network Security course, my professor mentioned that you can "knock off" a station of a network by abusing the timings of the exponential off algorithm used in CSMA/...
0votes
0answers
279views
Switch security - Multicast brute force attack and random frame attack
I came across these attacks, but every explanation I come across lacks clarity Random Frame-Stress Attack: A large number of packets is generated, randomly varying several fields within each packet ...
1vote
0answers
77views
Force A Reply WPA/WPA2
I am working on an open source project, and am currently stumped. Let’s say I have a client connect to a wireless WPA network I am not authenticated to the wireless network I just have a wireless card ...
1vote
1answer
246views
How Data Link layer trailer prevents data from being intercepted and tampers
I am reading on https://tryhackme.com/room/introtonetworking, it is talking about OSI model. It said that Data Link layer trailer can increase security as the data can't be intercepted and tampered. ...
1vote
1answer
298views
Would it be possible to create an external mac address spoofer?
I was wondering if it would be possible to create some sort of ethernet passthrough device, but this device also functions as a layer 2 mac address spoofer, which can be used with any device without ...
1vote
1answer
248views
Is the perfect MITM attack possible?
Let's imagine a data link layer level MITM attack. Is it possible to fulfill all of the following points? you completely hide your identity by forging your own MAC address you create malformed ...
1vote
1answer
1kviews
Can you scan unmanaged switches with vulnerability scanners?
The target switches do not have IP addresses and most scanners require IPs as targets. Can you scan unmanaged switches with vulnerability scanners? What scanners can target layer 2?
0votes
2answers
13kviews
MITM using ARP spoofing with Kali Linux running on VirtualBox with bridged wifi network adapter
At home I have two laptops (running on Windows). With one laptop (attacking laptop) I try to get in the middle of the connection of other laptop (victim laptop). To do this is run Kali Linux in a ...
3votes
2answers
2kviews
How to identify L2 devices in a Wide Area Network?
This is sample of a traceroute to google.com: TraceRoute from Network-Tools.com to 216.58.194.46 [google.com] Hop (ms) (ms) (ms) IP Address Host name 1 0 0 0 ...