What happened? If you look at the MAC addresses that the switch learned, you see CE:56:EE: 19:85:1a and 3A:50:DB:3f:E9:C2. Only three entries appear, even though macof was asked to generate five entries. Let's now start macof from the workstation connected to port Gi1/15, as shown in Example 2-3. Legend: * - primary entry age - seconds since last seen n/a - not available vlan mac address type learn age ports Values for any options left unspecified will be generated randomly.Įxample 2-2 presents a snapshot of a Catalyst 6500's bridging table before invoking macof.Įxample 2-2 Catalyst 6500 Bridging Table Before Macof OperationĦK-1-720# sh mac-address-table dynamic vlan 20 A straight C port of the original Perl Net::RawIP macof program by Ian Vitek. Macof floods the local network with random MAC addresses (causing some switches to fail open in repeating mode, facilitating sniffing). Macof - flood a switched LAN with random MAC addresses SYNOPSIS Macof is efficient and extremely simple to use. These tools include Ettercap3, Yersinia4, THC Parasite5, and macof. Today, various tools can perform MAC flooding attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |