HP CM8000 Practical IPsec Deployment for Printing and Imaging Devices - Page 20
Cargo Interception
View all HP CM8000 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 20 highlights
Paleontologist: Fossil Cargo Intermediate Stop Point B: Transfer Cargo to New Vehicle/Driver Thmisewsaeyumto the Intermediate Stop Point A: Transfer Cargo to New Vehicle/Driver Tmheissewuamy to the Intermediate Stop Point C: Transfer Cargo to New Vehicle/Driver Man-In-The-Middle (upset paleontologist) Figure 18 - Cargo Interception Museum Moving back to Ethernet frames, we can see that a MITM attack won't be altering the IP address information, but instead it will go after the Ethernet frame addressing information. By fooling Ethernet into delivering the packet to Jane, Jane can copy the data and then send the data back on its way as if nothing went wrong (just like our upset paleontologist). Ethernet addresses are kept in what is called a cache. This cache maps IP addresses to Ethernet Addresses. When data is being sent from one node to another, the networking driver will add the Ethernet Address to the Ethernet frame based upon this cached information. Refer to Figure 19 - Ping Communication. 20