Layer 1 and 2 DoS Attacks
From charlesreid1
Denial of service at level 1 or 2 can take two forms.
The first is a physical denial of service - this would be something like radio jamming or snipped network cables. This is a physical means of preventing a sheep from connecting to a network or to other resources.
The second is at the router level, and consists of tampering with the CAM table, which maps MAC addresses to IP addresses. (Note: technically, this is really a level 3 attack, but since I can't think of any purely Level 2 DoS attacks... there you go.)
CAM Overflow/MAC Flood: DoS/Mac Flood
- This type of attack is more useful in man-in-the-middle attacks, as a full CAM table does not break the router, it simply causes the router to broadcast traffic to all ports and all parties on the network.
- It can still be a useful mitigation technique, however. For routers on small networks that are logging MAC addresses of clients, one new mac address may
Flags
| Denial of Service denial of service attacks for denying users access to resources that they are otherwise entitled to access.
DoS at Layers 1 and 2: CAM Table Overflow/MAC Flood: DoS/Mac Flood CAM Table Poisoning: DoS/Cam Poisoning
DoS at Layers 3 and 4: Syn Flood: DoS/SYN Flood Smurf Attack (Ping Flood): DoS/Smurf Attack DNS Attacks: DoS/DNS DNSSmurf Attack: DoS/DNSSmurf Wormhole Attack: DoS/Wormhole Attack Black Hole Attack: DoS/Black Hole Attack Byzantine Attack: DoS/Byzantine Attack Sleep Deprivation Attack: DoS/Sleep Deprivation Attack Stale Packets: DoS/Stale Packets
Toolz: Hping · Macof · Tcpnice · Hammer · Tors Hammer
Category:DoS · Category:Attacks · Category:Kali Attack Layers Flags · Template:DoSFlag · e |