Arp A Stp Гєtoky.pptx -
: Prevents a port from becoming a root port, ensuring the Root Bridge remains on a trusted core switch.
: Automatically disables a port if it receives an STP BPDU, preventing unauthorized devices from influencing the STP topology.
: Both protocols can be exploited to cause Denial of Service (DoS) . For example, flooding a network with ARP requests can overwhelm device tables, while STP loops (caused by disabled or misconfigured STP) can create broadcast storms that crash the network. ARP a STP Гєtoky.pptx
: In an STP attack, a malicious actor sends Bridge Protocol Data Units (BPDUs) with a higher priority (lower numerical value) to force the network to elect their device as the "Root Bridge". This causes all network traffic to flow through the attacker's device for interception.
These protocols are foundational to local area networks (LANs) but lack built-in security, making them common targets for network-level attacks: : Prevents a port from becoming a root
: Validates ARP packets on the network to prevent spoofing.
: Attackers send falsified ARP messages to a local network to link their MAC address with the IP address of a legitimate server or gateway. This allows them to intercept, modify, or stop data in transit, often facilitating Man-in-the-Middle (MitM) attacks. For example, flooding a network with ARP requests
What Is ARP (Address Resolution Protocol)? How Does It Work?