Skip to main content

Questions tagged [data-link-layer]

2votes
0answers
73views

Can exponential back-off be abused to "knock off" a station off a network?

In my Cryptography & Network Security course, my professor mentioned that you can "knock off" a station of a network by abusing the timings of the exponential off algorithm used in CSMA/...
Better Fly's user avatar
0votes
0answers
279views

Switch security - Multicast brute force attack and random frame attack

I came across these attacks, but every explanation I come across lacks clarity Random Frame-Stress Attack: A large number of packets is generated, randomly varying several fields within each packet ...
Beginner's user avatar
1vote
0answers
77views

Force A Reply WPA/WPA2

I am working on an open source project, and am currently stumped. Let’s say I have a client connect to a wireless WPA network I am not authenticated to the wireless network I just have a wireless card ...
sonicCrypt0r's user avatar
1vote
1answer
246views

How Data Link layer trailer prevents data from being intercepted and tampers

I am reading on https://tryhackme.com/room/introtonetworking, it is talking about OSI model. It said that Data Link layer trailer can increase security as the data can't be intercepted and tampered. ...
trieulieuf9's user avatar
1vote
1answer
298views

Would it be possible to create an external mac address spoofer?

I was wondering if it would be possible to create some sort of ethernet passthrough device, but this device also functions as a layer 2 mac address spoofer, which can be used with any device without ...
Alexm's user avatar
1vote
1answer
248views

Is the perfect MITM attack possible?

Let's imagine a data link layer level MITM attack. Is it possible to fulfill all of the following points? you completely hide your identity by forging your own MAC address you create malformed ...
user avatar
1vote
1answer
1kviews

Can you scan unmanaged switches with vulnerability scanners?

The target switches do not have IP addresses and most scanners require IPs as targets. Can you scan unmanaged switches with vulnerability scanners? What scanners can target layer 2?
Ciglo's user avatar
0votes
2answers
13kviews

MITM using ARP spoofing with Kali Linux running on VirtualBox with bridged wifi network adapter

At home I have two laptops (running on Windows). With one laptop (attacking laptop) I try to get in the middle of the connection of other laptop (victim laptop). To do this is run Kali Linux in a ...
Stefan's user avatar
3votes
2answers
2kviews

How to identify L2 devices in a Wide Area Network?

This is sample of a traceroute to google.com: TraceRoute from Network-Tools.com to 216.58.194.46 [google.com] Hop (ms) (ms) (ms) IP Address Host name 1 0 0 0 ...
R1W's user avatar
  • 1,627

close