Vlans Layer 2 Attacks: Their Relevance And Their Kryptonite presented at The Last HOPE 2008

by Kevin Figueroa, Marco Figueroa, Anthony L. Williams,

Tags: Security Infrastructure

Summary : Proper network infrastructure configuration is a crucial step in a successful in depth defense strategy for any organization. The fact that the network fabric is susceptible to these attacks years after their initial discovery is alarming and disgusting at the same time. This discussion revisits these attacks using contemporary techniques and tools and also offers equally contemporary solutions to mitigate or foil these malicious network attacks as the case may be. Networking professionals will be able to walk away from this presentation with solid remedies to these issues and with a reinforcement that they actually still exist and are pertinent to a network security strategy that will function now and in the future.