First page Back Continue Last page Image
LAN STP Attack
- Network attackers can manipulate the Spanning Tree Protocol (STP) by spoofing the root bridge and changing the topology of a network
- Attackers can then capture all traffic for the immediate switched domain
- The attacking host broadcasts STP bridge protocol data units (BPDUs) with configuration changes that will force spanning-tree recalculations
- The BPDUs sent by the attacking host announce a lower bridge priority in an attempt to be elected as the root bridge
This STP attack is mitigated by implementing BPDU Guard on all access ports