Network Topologies: WAN (Wide Area Network) : Description
Network Topologies: WAN (Wide Area Network) : Description
○ Use Case: Cloud service providers using virtual networks to isolate customer
environments.
● Controlled Access: Allows external users to access certain services while keeping the
internal network secure.
● Reduced Risk of Attacks: If a service in the DMZ is compromised, the attacker has
limited access to the internal network.
● Extranet:
○ An extension of the intranet that allows controlled access to external users, such
as partners or vendors, enabling collaboration while maintaining security.
○ A network that is accessible to anyone, such as the internet. It is less secure due
to its open nature.
● Private Network:
● VLAN Hopping:
○ An attack where an attacker gains access to traffic on other VLANs that should
not be accessible.
○ The attacker sends frames with two VLAN tags; the first tag is stripped off by the
switch, allowing the second tag to be processed by another VLAN.
○ The attacker tricks the switch into thinking their device is a trunking switch,
allowing access to all VLANs.
● Accounting: Tracking user activity and resource usage for auditing purposes.
Telnet vs SSH
● Telnet:
● SSH encrypts all data transmitted over the network, protecting against eavesdropping
and man-in-the-middle attacks, while Telnet transmits data in plain text.
Role-Based Privilege
Role-based privilege management assigns access rights based on user roles within an
organization. This ensures that users have only the permissions necessary for their job
functions, enhancing security by minimizing unnecessary access.
○ An attacker manipulates STP to create loops in the network or take over the role
of the root bridge, leading to broadcast storms and network downtime.
○ An attacker sends false ARP messages to associate their MAC address with the
IP address of another device, allowing them to intercept traffic meant for that
device.
3. DHCP Attack (Dynamic Host Configuration Protocol Attack):
○ An attacker floods a switch's Content Addressable Memory (CAM) table with fake
MAC addresses, causing legitimate traffic to be sent out of all ports, leading to
potential data interception.
Each of these attacks can significantly compromise network security and integrity if not properly
mitigated through appropriate security measures and configurations.
Citations:
1. https://networklessons.com/switching/vlan-hopping
2. https://www.terminalworks.com/blog/post/2020/06/14/dmz-or-demilitarized-zone-for-netw
orking
3. https://www.techtarget.com/searchsecurity/definition/VLAN-hopping
4. https://www.diva-portal.org/smash/get/diva2:358209/FULLTEXT01.pdf
5. https://en.wikipedia.org/wiki/VLAN_hopping
6. https://www.fortinet.com/resources/cyberglossary/what-is-dmz
7. https://ccoe.dsci.in/blog/vlan-hopping-and-how-to-mitigate-an-attack
8. https://www.techtarget.com/searchsecurity/definition/DMZ