{"id":75,"date":"2025-06-13T00:52:34","date_gmt":"2025-06-13T00:52:34","guid":{"rendered":"https:\/\/epbrtcybersecurityportfolio.xyz\/?p=75"},"modified":"2025-06-14T17:22:12","modified_gmt":"2025-06-14T17:22:12","slug":"the-network-access-link-layer","status":"publish","type":"post","link":"https:\/\/epbrtcybersecurityportfolio.xyz\/?p=75","title":{"rendered":"The Network Access\/Link Layer"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Link Layer Analysis Lab \u2013 Overview and Setup<\/h3>\n\n\n\n<p>This set of exercises focuses on analyzing network activity at the <strong>Link Layer<\/strong>.<\/p>\n\n\n\n<p><strong>Lab Setup<\/strong><\/p>\n\n\n\n<p>For this lab, I used Wireshark to analyze a file called <code>link.pcap<\/code>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exercise 1 \u2013 Analyzing the First Record<\/h3>\n\n\n\n<p><strong>1. In the first record, what is 192.168.11.11 trying to find?<\/strong><\/p>\n\n\n\n<p>To answer this, I examined the first packet in the <code>link.pcap<\/code> file. <\/p>\n\n\n\n<p>We can see that this an ARP request going from mac address aa:00:04:00:0a:04 (which is the mac address associated with the IP address 192.168.11.11) to the mac address ff:ff:ff:ff:ff:ff (the broadcast address). It is looking for the mac address associated with the IP address 192.168.11.1<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"481\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-14-1024x481.png\" alt=\"\" class=\"wp-image-77\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-14-1024x481.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-14-300x141.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-14-768x360.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-14.png 1453w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>2. What is the Ethernet destination address in the ARP request? Why is the request sent to this address?<\/strong><\/p>\n\n\n\n<p>While examining the ARP request in the packet capture, I checked the <strong>Ethernet II<\/strong> header to find the <strong>destination MAC address<\/strong>. In an ARP request, this address is typically set to the <strong>broadcast address<\/strong> <code>ff:ff:ff:ff:ff:ff<\/code>.<\/p>\n\n\n\n<p>This is done because the sender doesn\u2019t yet know the MAC address of the target IP and needs to ask <strong>all devices on the local network<\/strong> if they are the owner of that IP address. Broadcasting ensures that the request reaches every host on the subnet.<\/p>\n\n\n\n<p><strong>3. What is the hexadecimal Ethernet II Type for an ARP request?<\/strong><\/p>\n\n\n\n<p>It is 0x0806<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"89\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-15-1024x89.png\" alt=\"\" class=\"wp-image-78\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-15-1024x89.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-15-300x26.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-15-768x67.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-15.png 1102w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>4. What is the Target MAC address of the ARP request? Why do you suppose this address is used?<\/strong><\/p>\n\n\n\n<p>When analyzing the ARP request in Wireshark, I checked the <strong>Target MAC address<\/strong> field in the ARP header. This field was set to <strong>00:00:00:00:00:00<\/strong>.<\/p>\n\n\n\n<p>This makes sense because the sender is trying to discover the MAC address of the target IP\u2014they don\u2019t know it yet. The all-zero MAC address is used as a placeholder to indicate that this information is currently unknown and is the whole reason the ARP request is being broadcast.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"404\" height=\"194\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-16.png\" alt=\"\" class=\"wp-image-79\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-16.png 404w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-16-300x144.png 300w\" sizes=\"auto, (max-width: 404px) 100vw, 404px\" \/><\/figure>\n\n\n\n<p><strong>5. Examine record 2. What type of ARP is this?<\/strong><\/p>\n\n\n\n<p>In <strong>record 2<\/strong> of the capture, I analyzed the ARP packet details in Wireshark. Based on the fields, I could tell this was an <strong>ARP reply<\/strong>. Unlike an ARP request, which is broadcast to ask for a MAC address, the ARP reply is a <strong>direct response<\/strong> from the device that owns the IP address, providing its MAC address to the requester.<\/p>\n\n\n\n<p>This completes the ARP resolution process, allowing the devices to communicate at the Ethernet level.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"614\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-17-1024x614.png\" alt=\"\" class=\"wp-image-80\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-17-1024x614.png 1024w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-17-300x180.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-17-768x461.png 768w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-17.png 1094w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>6. What is the Sender MAC address of 192.168.11.1?<\/strong><\/p>\n\n\n\n<p>To answer this, I looked at the ARP reply packet in the capture where <strong>192.168.11.1<\/strong> is listed as the sender. In the ARP header, the <strong>Sender MAC address<\/strong> field contains the hardware address associated with that IP (00:0c:29:03:23:19). This is the MAC address the device is announcing to the network, and it&#8217;s what other hosts will use to communicate at the Ethernet layer.<\/p>\n\n\n\n<p><strong>7. What is the MAC address of the intended recipient of this ARP message?<\/strong><\/p>\n\n\n\n<p>To determine the intended recipient&#8217;s MAC address, I examined the <strong>Target MAC address<\/strong> field in the ARP reply. This field shows the hardware address (aa:00:04:00:0a:04) of the device that originally sent the ARP request.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Exercise 2 \u2013 Interpreting Linked ARP Activity<\/h3>\n\n\n\n<p><strong>Examine records 3, 4, and 5, which are all associated with each other. What do you think is happening?<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"916\" height=\"58\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-18.png\" alt=\"\" class=\"wp-image-83\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-18.png 916w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-18-300x19.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-18-768x49.png 768w\" sizes=\"auto, (max-width: 916px) 100vw, 916px\" \/><\/figure>\n\n\n\n<p>After examining records <strong>3, 4, and 5<\/strong>, it became clear that something suspicious was occurring with the ARP replies.<\/p>\n\n\n\n<p>In <strong>record 3<\/strong>, host <strong>192.168.11.4<\/strong> sends an ARP request asking for the MAC address of <strong>192.168.11.111<\/strong>.<br>In <strong>record 4<\/strong>, a legitimate response comes from <strong>192.168.11.111<\/strong>, returning its correct MAC address.<br>However, in <strong>record 5<\/strong>, a second ARP reply is sent\u2014also claiming to be from <strong>192.168.11.111<\/strong>, but with a <strong>different MAC address<\/strong>.<\/p>\n\n\n\n<p>This is a red flag. The presence of two conflicting ARP replies suggests that someone is attempting to <strong>poison the ARP cache<\/strong> of the original requester (<strong>192.168.11.4<\/strong>). The attacker is trying to trick it into associating the IP address <strong>192.168.11.111<\/strong> with the <strong>attacker\u2019s MAC address<\/strong>, effectively redirecting traffic meant for the legitimate host.<\/p>\n\n\n\n<p>This is a classic example of <strong>ARP spoofing<\/strong>, a technique used in <strong>man-in-the-middle (MITM) attacks<\/strong> to intercept or manipulate traffic. The warning in Wireshark also highlights this as a <strong>duplicate IP address<\/strong> issue, which further confirms the attempt to mislead the network.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"848\" height=\"44\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-19.png\" alt=\"\" class=\"wp-image-85\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-19.png 848w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-19-300x16.png 300w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-19-768x40.png 768w\" sizes=\"auto, (max-width: 848px) 100vw, 848px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Exercise 3 \u2013 Analyzing Suspicious MAC-to-IP Associations<\/h3>\n\n\n\n<p>In this exercise, I reviewed packets <strong>6 through 55<\/strong>, which represent a small sample of many similar records captured during an attack simulation using the <strong>macof<\/strong> tool. The focus was on analyzing the <strong>Ethernet headers<\/strong> at the link layer.<\/p>\n\n\n\n<p><strong>1. What is the source MAC address of records 6, 7, and 8?<\/strong><br>I checked each record and found that all three packets had <strong>different source MAC addresses<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Record 6: <code>67:aa:17:2f:ba:02<\/code><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"514\" height=\"348\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-20.png\" alt=\"\" class=\"wp-image-86\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-20.png 514w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-20-300x203.png 300w\" sizes=\"auto, (max-width: 514px) 100vw, 514px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Record 7: <code>ac:1d:9d:2e:7c:71<\/code><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"437\" height=\"346\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-21.png\" alt=\"\" class=\"wp-image-87\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-21.png 437w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-21-300x238.png 300w\" sizes=\"auto, (max-width: 437px) 100vw, 437px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Record 8: <code>c6:58:a2:5e:02:49<\/code><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"497\" height=\"311\" src=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-22.png\" alt=\"\" class=\"wp-image-88\" srcset=\"https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-22.png 497w, https:\/\/epbrtcybersecurityportfolio.xyz\/wp-content\/uploads\/2025\/06\/image-22-300x188.png 300w\" sizes=\"auto, (max-width: 497px) 100vw, 497px\" \/><\/figure>\n\n\n\n<p><strong>2. What is the source IP address in records 6\u201355?<\/strong><br>All of these packets used the same source IP address: <code>10.10.10.5<\/code>.<\/p>\n\n\n\n<p><strong>3. What is wrong with these MAC address-to-IP address associations? What does this indicate?<\/strong><br>This behavior is highly abnormal. Multiple packets are using different MAC addresses while claiming the same IP address. This inconsistency suggests that the traffic is <strong>spoofed<\/strong>, which is a hallmark of a <strong>MAC flooding attack<\/strong>. Tools like <code>macof<\/code> generate thousands of fake MAC\/IP combinations to overflow the switch\u2019s MAC address table, potentially forcing it into <strong>fail-open mode<\/strong>, where it floods traffic to all ports\u2014opening the door to <strong>packet sniffing<\/strong> by an attacker.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Link Layer Analysis Lab \u2013 Overview and Setup This set of exercises focuses on analyzing network activity at the Link Layer. Lab Setup For this lab, I used Wireshark to analyze a file called link.pcap. Exercise 1 \u2013 Analyzing the First Record 1. In the first record, what is 192.168.11.11 trying to find? To answer [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[8,6],"class_list":["post-75","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-link-layer","tag-wireshark"],"_links":{"self":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/75","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=75"}],"version-history":[{"count":4,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/75\/revisions"}],"predecessor-version":[{"id":89,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/75\/revisions\/89"}],"wp:attachment":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=75"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=75"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}