Anatomy of An ARP Spoofing Attack
The basic principle behind ARP spoofing is to exploit the above mentioned vulnerabilities in the ARP protocol by sending spoofed ARP messages onto the LAN. ARP spoofing attacks can be run from a compromised host on the LAN, or from an attacker's machine that is connected directly to the target LAN.
Generally, the goal of the attack is to associate the attacker's MAC address with the IP address of a target host, so that any traffic meant for the target host will be sent to the attacker's MAC instead. The attacker could then choose to:
- Inspect the packets, and forward the traffic to the actual default gateway (interception)
- Modify the data before forwarding it (man-in-the-middle attack).
- Launch a denial-of-service attack by causing some or all of the packets on the network to be dropped
Read more about this topic: ARP Spoofing
Famous quotes containing the words anatomy, arp and/or attack:
“I love to see, when leaves depart,
The clear anatomy arrive,”
—Roy Campbell (19021957)
“Art is a fruit that grows in man, like a fruit on a plant, or a child in its mothers womb.”
—Jean Arp (18871948)
“Hence that general is skilful in attack whose opponent does not know what to defend; and he is skilful in defense whose opponent does not know what to attack.”
—Sun Tzu (6th5th century B.C.)