ARP Spoofing - Anatomy of An ARP Spoofing Attack

Anatomy of An ARP Spoofing Attack

The basic principle behind ARP spoofing is to exploit the above mentioned vulnerabilities in the ARP protocol by sending spoofed ARP messages onto the LAN. ARP spoofing attacks can be run from a compromised host on the LAN, or from an attacker's machine that is connected directly to the target LAN.

Generally, the goal of the attack is to associate the attacker's MAC address with the IP address of a target host, so that any traffic meant for the target host will be sent to the attacker's MAC instead. The attacker could then choose to:

  1. Inspect the packets, and forward the traffic to the actual default gateway (interception)
  2. Modify the data before forwarding it (man-in-the-middle attack).
  3. Launch a denial-of-service attack by causing some or all of the packets on the network to be dropped

Read more about this topic:  ARP Spoofing

Famous quotes containing the words anatomy, arp and/or attack:

    Man is a shrewd inventor, and is ever taking the hint of a new machine from his own structure, adapting some secret of his own anatomy in iron, wood, and leather, to some required function in the work of the world.
    Ralph Waldo Emerson (1803–1882)

    Art is a fruit that grows in man, like a fruit on a plant, or a child in its mother’s womb.
    —Jean Arp (1887–1948)

    His spiritual life has been exaggerated by a chronic attack of mental gallstones.
    Oliver St. John Gogarty (1878–1957)