Step 1 in Figure 3-9 demonstrates the three discovered devices (Devices A, B, and C) in the CAM table. This is best illustrated in Figure 3-9.ĬAM Table Port 1 Empty Port 2 B Port 3 AC This enables the spoofed CAM entry on the switch to be overwritten as well. This provides the intruder valuable details about applications in use and destination host IP addresses. The intruder then presents itself as the default gateway and copies all of the data forwarded to the default gateway without being detected.
A MAC spoofing attack is where the intruder sniffs the network for valid MAC addresses and attempts to act as one of the valid MAC addresses.