Analyzing & Detecting IEEE 802.x Link Layer Attacks -Part 1

Analyzing & Detecting IEEE 802.x Link Layer Attacks -Part 1

WHAT IS BLUE TEAM SKILLS

Blue Team Skills is a micro blogging series of entry level to intermediate Blue Team skills I feel are essential to have knowledge on if you want to be a good defender.

The blogs are in micro format, meaning that you can focus on one particular element/learning concept at a time, as I feel this facilitates the learning and retention process. In my personal journey of studying Incident Response and Threat Hunting I will share what I have learnt through this blog series for other aspiring blue teamers. 


The IEEE 802.x Link layers are a family of standards that enable intercommunication's between equipment from a variety of manufacturers.

This family of standards actually specifies functions of the physical layer and the data link layer of major LAN protocols.

No alt text provided for this image

 Protocols at each TCP/IP Layer

The most known link layers being used nowadays are:

The Network Access/Link Layer, Ethernet , Wireless and Bluetooth.

Link layer communication is facilitated by Network Interface Cards (NICs) and the respective device drivers. Any NIC has a unique identification number known as a MAC address which is issued by the NIC’s manufacturer during NIC creation.

MAC addresses are static 48-bit long numbers. According to the TCP/IP stack, the IP layer will have to find a way to talk to the Link layer; this is done through an IP-to-MAC address association. The IP layer communicates using IP addresses, whereas the Link layer communicates using MAC addresses.

What makes this association possible in IPv4 is ARP. - Address Resolution Protocol

No alt text provided for this image


In IPv6, Neighbor Solicitation is used to request for a MAC address associated with a given IPv6 address, and Neighbor Advertisement is used for sending the response.

At this point, it should be noted that ARP traffic is generated only when two hosts residing in same local network want to communicate.

If the two hosts reside on different physical segments, traffic will be routed via the Internet layer first and then passed to the Network Access layer.


To view or add a comment, sign in

More articles by Douglas Geddes

  • Mapping Data Sources to the ATT&CK Cloud Matrix -(Process Creation)

    In this short article, we will look at mapping the data source of Process (Component - Process Creation) to the MITRE…

  • Detecting IPv6 Tunneling

    WHAT IS BLUE TEAM SKILLS Blue Team Skills is a micro blogging series of entry level to intermediate Blue Team skills I…

  • TCP/IP Encapsulation with WireShark

    WHAT IS BLUE TEAM SKILLS Blue Team Skills is a micro blogging series of entry level to intermediate Blue Team skills I…

    1 Comment
  • CAN YOU AFFORD TO LOSE YOUR DATA?

    WHAT IS IT ? The Q-DLP® (Data Loss Prevention) is a stand-alone, dedicated Data Loss Prevention tool (DLP),using…

  • LOGGING DATA SHOULD NOT BE EXPENSIVE - HERE IS WHY

    WHAT IS IT ? The Q-Log® is an extremely small form factor, low-power-consumption server providing full log collection…

    1 Comment
  • How to Install Intel Owl in Kali Linux

    What is it ? A scalable API which gathers threat intelligence data about a particular file or observable (ip, domain…

  • Q-VPN - REWRITING THE BENCHMARK IN VPN SERVICES

    WHAT IS IT ? The Q-VPN® is an amalgamation of a number of open source software packages running on an extremely small…

    1 Comment
  • QUANTALYTICS Q-BOX

    The Q-Box® is an amalgamation of a number of open source software packages running on an extremely ultra small form…

  • A WELLNESS COACHES PERSPECTIVE OF 90 DAYS IN THE OSCP LABS -Part 1

    INTRODUCTION Yes, I know the title does sound a bit odd, especially when you see all the articles out there that are…

  • Cyber Hacks For NooBS

    Exploiting basic code execution vulnerabilities Introduction We are going to be looking at exploiting a basic command…

    3 Comments

Explore content categories