Anatomy of An ARP Spoofing Attack
The basic principle behind ARP spoofing is to exploit the above mentioned vulnerabilities in the ARP protocol by sending spoofed ARP messages onto the LAN. ARP spoofing attacks can be run from a compromised host on the LAN, or from an attacker's machine that is connected directly to the target LAN.
Generally, the goal of the attack is to associate the attacker's MAC address with the IP address of a target host, so that any traffic meant for the target host will be sent to the attacker's MAC instead. The attacker could then choose to:
- Inspect the packets, and forward the traffic to the actual default gateway (interception)
- Modify the data before forwarding it (man-in-the-middle attack).
- Launch a denial-of-service attack by causing some or all of the packets on the network to be dropped
Read more about this topic: ARP Spoofing
Famous quotes containing the words anatomy, arp and/or attack:
“I love to see, when leaves depart,
The clear anatomy arrive,”
—Roy Campbell (19021957)
“Soon silence will have passed into legend. Man has turned his back on silence. Day after day he invents machines and devices that increase noise and distract humanity from the essence of life, contemplation, meditation.... Tooting, howling, screeching, booming, crashing, whistling, grinding, and trilling bolster his ego. His anxiety subsides. His inhuman void spreads monstrously like a gray vegetation.”
—Jean Arp (18871948)
“Lesbian existence comprises both the breaking of a taboo and the rejection of a compulsory way of life. It is also a direct or indirect attack on the male right of access to women.”
—Adrienne Rich (b. 1929)