What is MAC Flooding? How to prevent it?

Posted at October 28, 2016 at 4:26 pm by Jithin

MAC Flooding MAC Flooding is one of the most common network attacks. Unlike other web attacks,  MAC Flooding is not a method of attacking any host machine in the network, but it is the method of attacking the network switches. However, the victim of the attack is a host computer in the network. We are going to see what the MAC Flooding is and how can we prevent it. To proceed further, we need to know what a switch is and how it works.   Network Switches A network switch is a   [...]

Read More

What is IP Spoofing? Types of IP Spoofing

Posted at October 14, 2016 at 4:02 pm by Jithin

What is IP Spoofing Before discussing about IP spoofing, let's see take a look at IP addresses. An IP address is a unique set of numbers which separated with the full stops which is used to identify each computer using the Internet Protocol to communicate over a network. IP spoofing can be defined as an attacking technique where, the hacker pretends to be someone else is not as a trusted host and conceal his identity to gain access to a network and hijack the browsers. IP spoofing is also cal   [...]

Read More