Open In App

What is Port Stealing?

Cyber security is the security of the web and related services related to the web. Cyber security is the way to prevent many cyber attacks from taking place. Cyber security ensures that awareness of the cyber-attacks along with the different forms of cyber attacks are well-known to people so that they can prevent the cyber attacks from taking place. Cyber security also makes the computer network users aware of the norms they must follow if they ever get stuck in any kind of cyber attack so that the users can deal with the cyber attack efficiently. The different types of cyber-attacks that cybercriminals adopt are dependent on the vulnerability of the computer network they want to target. It thus becomes important to know about the cyber attacks, the mechanism involved while executing cyber attacks, their types, and preventive ways behind the cyber attacks.

 

Port Stealing Attack:

Port stealing is a man-in-the-middle attack via a LAN switch. It attempts to intercept packets sent to another host by stealing the switch’s port from the desired host. This attack is intended to be used only on the local network. The attacker uses the victim’s stolen MAC address to force the switch to modify the forwarding table. Packets sent to the victim’s computer are sent to the port to which the attacker is connected. (Ettercap) From this point on, an attacker could read the information in the packet, cause a delay, or prevent the packet from reaching the victim. Port stealing uses a switch The connection between the MAC address binding and the physical port itself.

Key Points of Port stealing Attack:

Mechanism of Port Stealing Attack:

Prevention from Port Stealing Attack:

Port Stealing attack can be prevented by proper vigilance of the attack and by following below preventive ways to prevent attackers to enter the computer system through port stealing -


  1. Timely updating present Switch address: Keep updating the address of the switch on regular basis. This makes the address a less vulnerable target to cyber attackers.
  2. Making use of good quality switches: Ensure using of enterprise-grade switches, which prevent any kind of malicious attack that may result in port stealing.
Article Tags :