HP CM8000 Practical IPsec Deployment for Printing and Imaging Devices - Page 20

Cargo Interception

Page 20 highlights

Paleontologist: Fossil Cargo Intermediate Stop Point B: Transfer Cargo to New Vehicle/Driver Thmisewsaeyumto the Intermediate Stop Point A: Transfer Cargo to New Vehicle/Driver Tmheissewuamy to the Intermediate Stop Point C: Transfer Cargo to New Vehicle/Driver Man-In-The-Middle (upset paleontologist) Figure 18 - Cargo Interception Museum Moving back to Ethernet frames, we can see that a MITM attack won't be altering the IP address information, but instead it will go after the Ethernet frame addressing information. By fooling Ethernet into delivering the packet to Jane, Jane can copy the data and then send the data back on its way as if nothing went wrong (just like our upset paleontologist). Ethernet addresses are kept in what is called a cache. This cache maps IP addresses to Ethernet Addresses. When data is being sent from one node to another, the networking driver will add the Ethernet Address to the Ethernet frame based upon this cached information. Refer to Figure 19 - Ping Communication. 20

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

20
Paleontologist:
Fossil Cargo
Intermediate Stop
Point A: Transfer
Cargo to New
Vehicle/Driver
Museum
This way to the
meseum
Intermediate Stop
Point B: Transfer
Cargo to New
Vehicle/Driver
Intermediate Stop
Point C: Transfer
Cargo to New
Vehicle/Driver
Man-In-The-Middle (upset
paleontologist)
This way to the
meseum
Figure 18 - Cargo Interception
Moving back to Ethernet frames, we can see that a MITM attack won’t be altering the IP address
information, but instead it will go after the Ethernet frame addressing information.
By fooling Ethernet
into delivering the packet to Jane, Jane can copy the data and then send the data back on its way as
if nothing went wrong (just like our upset paleontologist).
Ethernet addresses are kept in what is called a cache.
This cache maps IP addresses to Ethernet
Addresses.
When data is being sent from one node to another, the networking driver will add the
Ethernet Address to the Ethernet frame based upon this cached information.
Refer to Figure 19 – Ping
Communication.