Seminariode Seguridad L2

1,517 views

Published on

Published in: Technology, Education
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,517
On SlideShare
0
From Embeds
0
Number of Embeds
213
Actions
Shares
0
Downloads
81
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Seminariode Seguridad L2

    1. 1. L2 Security Issues for small and medium enterprise Joffre Pesántez V. Ing. CCNA – CCDA – CCDP CCNP – Comp Tia Linux +
    2. 2. AGENDA <ul><ul><ul><ul><li>Ataques comunes en Capa 2 </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Asegurando sus equipos de Capa 2 </li></ul></ul></ul></ul>
    3. 3. Ataques comunes en Capa 2
    4. 4. Ataques Comunes en Capa 2 <ul><li>MAC Attacks (CAM Table Overflow) </li></ul><ul><li>DHCP Attacks </li></ul><ul><li>ARP Attacks </li></ul><ul><li>Spoofing Attacks </li></ul><ul><li>Power over Ethernet Attack </li></ul><ul><li>VLAN hopping </li></ul><ul><li>General Countermeasures </li></ul>
    5. 5. Mac Attacks
    6. 6. CAM Overview
    7. 7. Poblando la Tabla CAM (1)
    8. 8. Poblando la Tabla CAM (2)
    9. 9. Poblando la Tabla CAM (3)
    10. 10. CAM Overflow
    11. 11. CAM Overflow: Macof tool
    12. 12. CAM Overflow: Macof tool
    13. 13. Mac Flooding using macof
    14. 14. Mack Attack: Contramedidas
    15. 15. MAC Attack: Contramedidas
    16. 16. MAC Attack: Contramedidas
    17. 17. DHCP Attacks
    18. 18. DHCP Overview
    19. 19. DHCP Attack: Starvation
    20. 20. Countermeasures: Port Security
    21. 21. DHCP Attack: Rogue DHCP Server
    22. 22. Contramedida: VLAN access-list
    23. 23. Contramedida: DHCP Snooping
    24. 24. Contramedidas: DHCP Snooping
    25. 25. ARP Attacks http://www.oxid.it/downloads/apr-intro.swf
    26. 26. ARP Attacks
    27. 27. Contramedidas: Dynamic ARP Inspection
    28. 28. Contramedidas: DAI
    29. 29. Contramedidas: DAI
    30. 30. Contramedidas: DAI
    31. 31. Contramedidas: DAI
    32. 32. Contramedidas: DAI
    33. 33. Spoofing Attack
    34. 34. Spoofing Attack
    35. 35. Contramedida: IP Source Guard
    36. 36. Contramedida: IP Source Guard
    37. 37. Contramedida: IP Source Guard
    38. 38. Sumario
    39. 39. Spanning Tree Attack
    40. 40. Spanning Tree Basics
    41. 41. Spanning Tree Attack
    42. 42. Spanning Tree Attack
    43. 43. Contramedidas: BPDU Guard
    44. 44. Contramedidas: Root Guard
    45. 45. CDP Attack
    46. 46. CDP Attack
    47. 47. MATRIZ DE EQUIPOS
    48. 48. Más Contramedidas
    49. 49. Storm Control
    50. 50. Rate Limiting
    51. 51. Priority Policing
    52. 52. Secure Shell
    53. 53. Configuration File Security
    54. 54. Power Over Ethernet Attacks
    55. 55. PoE Attacks
    56. 56. PoE Attacks: Contramedidas
    57. 57. PoE Attacks: Contramedidas
    58. 58. VLAN HOPPING ATTACK
    59. 59. VLAN HOPPING
    60. 60. VLAN HOPPING: CONTRAMEDIDAS
    61. 61. USANDO SU CATALYST PARA PROTEGERSE: ACLs
    62. 62. TIPOS DE ACCESS LISTS
    63. 63. TIPOS DE ACCESS LISTS
    64. 64. CONFIGURING VACLs
    65. 65. CONFIGURING VACLs
    66. 66. CONFIGURING VACLs
    67. 67. CONFIGURING VACLs
    68. 68. CONFIGURING VACLs
    69. 69. CONFIGURING VACLs
    70. 70. Monitoring VACLs – Capture Port
    71. 71. Monitoring VACLs – Capture Port
    72. 72. Monitoring VACLs – Capture Port

    ×