Countering Attacks At Layer 2 (Build It!) presented at ShmooCon 2006

by Eric Smith,

Tags: Security Wireless

Summary : Network security at layer two is often overlooked because many administrators do not consider attacks from within to be a credible
threat. This philosophy may apply to carefully firewalled data centers, but universities and other institutional settings are particularly
vulnerable to attacks at layer two. Furthermore, nearly all wireless networks, even those employing WPA or 802.1x, can fall victim to the inherent trust designs of the underlying ethernet protocols. In this presentation we will demonstrate a number of layer two attacks and give examples of countermeasures that can be employed to minimize the exposure of your network. We will also introduce L2KB, our tool which can respond in real-time to a number of layer two attacks.