ARP Spoofing - Vulnerabilities of The Address Resolution Protocol

Vulnerabilities of The Address Resolution Protocol

The Address Resolution Protocol (ARP) is a widely used protocol for resolving network layer addresses into link layer addresses.

When an Internet Protocol (IP) datagram is sent from one host to another on a local area network, the destination IP address must be converted into a MAC address for transmission via the data link layer. When another host's IP address is known, and its MAC address is needed, a broadcast packet is sent out on the local network. This packet is known as an ARP request. The destination machine with the IP in the ARP request then responds with an ARP reply, which contains the MAC address for that IP.

ARP is a stateless protocol. Network hosts will automatically cache any ARP replies they receive, regardless of whether or not they requested them. Even ARP entries which have not yet expired will be overwritten when a new ARP reply packet is received. There is no method in the ARP protocol by which a host can authenticate the peer from which the packet originated. This behavior is the vulnerability which allows ARP spoofing to occur.

Read more about this topic:  ARP Spoofing

Famous quotes containing the words address and/or resolution:

    If you address a ghost as “Thing!”
    Or strike him with a hatchet,
    He is permitted by the King
    To drop all formal parleying—
    And then you’re sure to catch it!
    Lewis Carroll [Charles Lutwidge Dodgson] (1832–1898)

    Unfortunately, many things have been omitted which should have been recorded in our journal; for though we made it a rule to set down all our experiences therein, yet such a resolution is very hard to keep, for the important experience rarely allows us to remember such obligations, and so indifferent things get recorded, while that is frequently neglected. It is not easy to write in a journal what interests us at any time, because to write it is not what interests us.
    Henry David Thoreau (1817–1862)