MAC Flooding Attack
It is a technique that compromises the security of network switches.
Attack Flow
-
Open Two SSH Sessions
Start the SSH session 1 in terminal 1.
Start the SSH session 2 in terminal 2.
-
Flood the Switch and Capturing the Traffic
In the session 1, start tcpdump and keep it running.
In the session 2, start flooding the switch (here "eth1" interface).
After about 30 seconds, stop **macof** and **tcpdump**.
-
Investigate the Captured Traffic
In your local machine, transfer the dumped file named "/tmp/tcpdump.pcap" from the target machine to your local machine.
Investigate this file using Wireshark