Preview

Osi Attack

Powerful Essays
Open Document
Open Document
6295 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Osi Attack
Attacks on layer two of the OSI model
Seven layers of OSI
In 1977 a model called Open Systems Interconnection (OSI) was proposed, with the aim to establish an interoperability standard for different vendor products. This model defines several layers related to data transfer, from the lowest (physical) to the highest (application) layer. They have a strong dependence upon one another and headers are usually added when traversing from a lower layer to a higher one.
The seven layers are:
Layer 1 - Physical layer: handles the communication (and control) across the network channel.
Layer 2 - Data Link layer: establishes methods for delivering data blocks.
Layer 3 - Network layer: responsible for routing of data packets.
Layer 4 - Transport layer: responsible for reliable transmission of data
(without errors).
Layer 5 - Session layer: allows control of dialogue between applications.
Layer 6 - Presentation layer: helps to establish a data format amongst application, making presentation ordered.
Layer 7 - Application layer: establishes methods allowing the applications to access the OSI model (the network).
The Yersinia tool
In order to perform described Data Link layer attacks, we'll be using a tool called
Yersinia, written by the authors of this article. Yersinia is portable - written in C
(using libpcap and libnet), multithreaded (supports multiple users and multiple concurrent attacks). It can be used to analyse, edit and watch network packets and even save the traffic in pcap format.
Latest Yersinia version (0.5.5.2) supports the following protocols:
Spanning Tree Protocol (STP),
Cisco Discovery Protocol (CDP),
Dynamic Trunking Protocol (DTP),
Dynamic Host Configuration Protocol (DHCP),
Hot Standby Router Protocol (HSRP),
IEEE 802.1Q,
Inter-Switch Link Protocol (ISL),
VLAN Trunking Protocol (VTP).
Yersinia operates in one of three main modes:
command line: can be used for performing ad-hoc attacks - this mode was implemented to help

You May Also Find These Documents Helpful

  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 3: The network layer...This layer handles the routing of the data (sending it in the right direction to the right destination on outgoing transmissions and receiving incoming transmissions at the packet level). The network layer does routing and…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data Link: The protocol layer that transfers data between adjacent network nodes (The switches and MAC addresses)…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    c) Logical IDS: Network and workstation mechanisms that monitors network traffic and provide real-time alarms for network-based attacks Service Network.…

    • 1152 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    The Network Layer is accountable for implementing a logical addressing scheme and for transporting the packets from one end to the other end. The network layer can be connectionless or it can be connection oriented. This layer is also responsible for breaking larger packets up for delivery depending on the media this is known as packet switching. These protocols include Apple talk DDP, IP, and IPX.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The explosive growth and popularity of the Internet have resulted in thousands of structured query able information sources. Most organizations are familiar with Penetration Testing and other ethical hacking techniques as a means to understanding the current security status of their information system assets. Consequently, much of the focus of research, discussion, and practice, has traditionally been placed upon active probing and exploitation of security vulnerabilities. Since this type of active probing involves interacting with the target, it is often easily identifiable with the analysis of firewall and intrusion detection/prevention device (IDS or IPS) log files.…

    • 501 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The header tag represents a group of introductory or navigational aids. A header tag is intended to usually contain the section’s heading , but this is not required. The header tag can also be used to wrap a section’s table of contents, a search form, or any relevant logos.…

    • 235 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4

    • 342 Words
    • 2 Pages

    Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It can be used for computer network protocol analysis and security auditing. It is capable of intercepting traffic on a network segment, capturing passwords, and conducting active eavesdropping against a number of common protocols.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cnt 4513 Study Guild

    • 578 Words
    • 3 Pages

    Note: This study guild also include the material covered before midterm for completeness. You can focus on Chapter 4 and 5…

    • 578 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unknown Microorganism

    • 1335 Words
    • 6 Pages

    There are many types of microorganisms and ways to treat each one. Knowing the differences of each is vital to treat a patient correctly. The purpose of this report is to explain the process and steps used to identify a certain microorganism referred to as the unknown.…

    • 1335 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    There are three related Yersinia species, Yersinia pestis, Yersinia pseudo tuberculosis, and Yersinia entercolitica. Yersinia pestis poses a major threat to humans.…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Itp 1101 Research Paper

    • 2125 Words
    • 9 Pages

    This paper provides a general overview of denial-of-service attacks in which the primary goal of the attack is to remove or limit the victim’s access to a particular service or resource. The paper also provides an overview of on methods of attack and its impacts. It also includes information that may assist you on how to respond to such an attack.…

    • 2125 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    4.A paradigm for electronic communications where a message is broken up into blocks of data of limited size which are then transmitted one by one across the network is called:…

    • 3425 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Hca 220 Plathens

    • 342 Words
    • 2 Pages

    Complete the Name That Pathogen multimedia exercise located on your student Web site at http://corptrain.phoenix.edu/axia/hca240/name_that_pathogen.html. Once you have achieved a score of 100%, take a screen shot of the results by pressing Ctrl + Print Screen.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Black Death Impact

    • 375 Words
    • 2 Pages

    Dennis, DT., Gage, KL., Poland, JD., and Tikhomirvo, E., (1999), Plague Manual, World Health Organization, www.cdc.gov.…

    • 375 Words
    • 2 Pages
    Satisfactory Essays