CAM Flood is a C program designed to perform CAM table overflow attacks on Layer 2 switches. This attack floods the switch's CAM table with a large number of fake entries, causing it to behave like a hub, forwarding all packets to all ports, including unicast packets.
The CAM Flood program generates a large number of Ethernet frames with random MAC addresses and IPv4 payloads. These frames are then sent to the target switch using the libpcap library, causing it to become overwhelmed and enter hub mode. It is a simple C implementation of macof.
- Generates Ethernet frames with random MAC addresses and IPv4 payloads.
- Performs CAM table overflow attack on Layer 2 switches.
- Utilizes libpcap for sending packets at a low level.
- Linux operating system
- GCC compiler
- libpcap library
-
Clone the repository:
git clone https://github.com/JNStrauss/cam_flood.git cd cam_flood make
-
Run the program
sudo ./cam_flood [options]
-
Options
-h, --help Display this help message -n, --number Number of packets to send (default 10000) -i, --interface Interface on which to do the attack (default 'eth0') -s, --src Specify source IP address (default random for each packet) -d, --dst Specify destination IP address (default random for each packet) -e, --target Specify taget mac address (default random for each packet)
-
License
The program in under a MIT License