<div class="gmail_quote">On Fri, Apr 30, 2010 at 12:51 AM, <a href="mailto:general_email@technicalbloke.com">general_email@technicalbloke.com</a> <span dir="ltr"><<a href="mailto:general_email@technicalbloke.com">general_email@technicalbloke.com</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">Also I was advised of a potential "mac flooding"? attack that might<br>
force a switch to fail over into a hub mode of operation. I'd also like<br>
to check if my new switch is vulnerable to that attack, any ideas what<br>
its actually called, or what tool(s) can create it?<br></blockquote><div><br>If your still interested. On Cisco stuff I think it's called 'port security'. This will prevent a single port from allowing an undesirable number of MAC address's being used by one port. Thus you can't often overflow the CAM table which stores the MAC addressing to physical port mapping. If this isn't enabled though you can overflow the CAM table and then the device will move into the failopen mode and basically operate as a hub.<br>
<br>To test you can use macof which is part of dSniff and comes with Backtrack Linux.<br><br>What simple version of Linux did you go for in the end? I've used Xubutu & Fluxbuntu in the past.<br><br>Dan<br></div></div>