Anatomy of An ARP Spoofing Attack
The basic principle behind ARP spoofing is to exploit the above mentioned vulnerabilities in the ARP protocol by sending spoofed ARP messages onto the LAN. ARP spoofing attacks can be run from a compromised host on the LAN, or from an attacker's machine that is connected directly to the target LAN.
Generally, the goal of the attack is to associate the attacker's MAC address with the IP address of a target host, so that any traffic meant for the target host will be sent to the attacker's MAC instead. The attacker could then choose to:
- Inspect the packets, and forward the traffic to the actual default gateway (interception)
- Modify the data before forwarding it (man-in-the-middle attack).
- Launch a denial-of-service attack by causing some or all of the packets on the network to be dropped
Read more about this topic: ARP Spoofing
Famous quotes containing the words anatomy, arp and/or attack:
“Man is a shrewd inventor, and is ever taking the hint of a new machine from his own structure, adapting some secret of his own anatomy in iron, wood, and leather, to some required function in the work of the world.”
—Ralph Waldo Emerson (18031882)
“Art is a fruit that grows in man, like a fruit on a plant, or a child in its mothers womb.”
—Jean Arp (18871948)
“Ive seen things you people wouldnt believe. Attack ships on fire off the shoulder of Orion. I watched seabeams glitter in the dark near the Tennhauser Gate. All those moments will be lost in time like tears in rain. Time to die.”
—David Webb Peoples, U.S. screenwriter, and Ridley Scott. Roy Batty, Blade Runner, final words before dyingas an android he had a built-in life span that expired (1982)