ARP Spoofing - Vulnerabilities of The Address Resolution Protocol

Vulnerabilities of The Address Resolution Protocol

The Address Resolution Protocol (ARP) is a widely used protocol for resolving network layer addresses into link layer addresses.

When an Internet Protocol (IP) datagram is sent from one host to another on a local area network, the destination IP address must be converted into a MAC address for transmission via the data link layer. When another host's IP address is known, and its MAC address is needed, a broadcast packet is sent out on the local network. This packet is known as an ARP request. The destination machine with the IP in the ARP request then responds with an ARP reply, which contains the MAC address for that IP.

ARP is a stateless protocol. Network hosts will automatically cache any ARP replies they receive, regardless of whether or not they requested them. Even ARP entries which have not yet expired will be overwritten when a new ARP reply packet is received. There is no method in the ARP protocol by which a host can authenticate the peer from which the packet originated. This behavior is the vulnerability which allows ARP spoofing to occur.

Read more about this topic:  ARP Spoofing

Famous quotes containing the words address and/or resolution:

    If you address a ghost as “Thing!”
    Or strike him with a hatchet,
    He is permitted by the King
    To drop all formal parleying—
    And then you’re sure to catch it!
    Lewis Carroll [Charles Lutwidge Dodgson] (1832–1898)

    Compared to football, baseball is almost an Oriental game, minimizing individual stardom, requiring a wide range of aggressive and defensive skills, and filled with long periods of inaction and irresolution. It has no time limitations. Football, on the other hand, has immediate goals, resolution on every single play, and a lot of violence—itself a highlight. It has clearly distinguishable hierarchies: heroes and drones.
    Jerry Mander, U.S. advertising executive, author. Four Arguments for the Elimination of Television, ch. 15, Morrow (1978)