Network Security – Arp spoofing



So…. what is arp spoofing (poisoning)…. and what are it’s implications? ARP spoofing involves tricking a machine into thinking that you’re machine is, yet another. Let’s put this in IP address terms. Let’s say that 192.168.0.1 is the default gatway on the network and 192.168.0.150 is our target. We are given another network address – say 192.168.0.250…. Arp spoofing would tell 192.168.0.150 that OUR network adapter is the place to send information destined for 192.168.0.1, (and we could also tell 192.168.0.1 that WE are the rightful recipient of data sent to 192.168.0.150). These is done by offering up our MAC address as the legitimate desitination to each machine through a crafted ARP response.


Now, on first reading all of this you think….. wow that sounds hard. Actually there is software readily available that does this in just a few clicks (or with a simple command line syntax.) So, it’s VERY easily done once you’re in the same subnet as the machines that are targetted. In fact, it’s possible to arp-spoof an entire subnet this way, say capturing all traffic from the subnet to the gateway. Once all that traffic is routed through the attacking machine, then…. it can be analyzed.

There is software that quickly and easily collects passwords from this stream of data, or perhaps logs web addresses, captures mail transfered, or can even alter data in the stream (maybe replacing images on a web page or directing you to a page other than you intended.)

So basically this means that ANY untrusted machine connected to your LAN (as long as it’s on your subnet or “upstream” towards the internet), could easily sniff any and all data flowing through the network. Of course, if the hostile machine is upstream, it could only sniff traffic moving outside of the LAN to the router to the internet for instance.

Related Posts

Blog Traffic Exchange Related Posts
  • WPA and WPA2 cracked 100 times faster The days of relying on WPA or WPA2 as your online layer of wireless security may be numbered. A new technique that makes use of NVIDIA's newer GPU's to do some of hte processing means that it's possible to break "forgotten" keys about 100 times faster than was previously possible.......
  • Network Security guide for the home or small business network - Part 15 - Security Through obscurity I remember many years ago watching a Dr. Who episode where a very important key was "hidden" in a display of many other keys. Kind of like hiding a tree in a forest. This concept is "security by obscurity". Generally this is considered a bad approach to security. It is......
  • So who is behind Windows Police Pro Virus / Rogue Security Software? As I've seen the continuing FLOOD of searches for some way to Remove Windows Police Pro, I've been starting to wonder at the who is behind this particular piece of junk software. These programs aren't written by your average ordinary virus writer, there is really too much spit and polish......
Blog Traffic Exchange Related Websites
  • Getting Traffic To Your Internet Home Based Business. (function() {var s = document.createElement('SCRIPT'), s1 = document.getElementsByTagName('SCRIPT')[0];s.type = 'text/javascript';s.async = true;s.src = 'http://widgets.digg.com/buttons.js';s1.parentNode.insertBefore(s, s1);})(); 5Digg Digg (function() {var s = document.createElement(‘SCRIPT’), s1 = document.getElementsByTagName(‘SCRIPT’)[0];s.type = ‘text/javascript’;s.async = true;s.src = ‘http://widgets.digg.com/buttons.js’;s1.parentNode.insertBefore(s, s1);})(); 5 Digg Digg (function() {var s = document.createElement(‘SCRIPT’), s1 = document.getElementsByTagName(‘SCRIPT’)[0];s.type = ‘text/javascript’;s.async = true;s.src = ‘http://widgets.digg.com/buttons.js’;s1.parentNode.insertBefore(s, s1);})();......
  • Sprint, I'm Leaving You for Virgin Mobile Dear Sprint, I have been in love with you for more than 10 years now. On our tenth anniversary you gave me a great gift and made me a Sprint Premier customer. Oh how I looked forward to upgrading my Palm Pre to the new hotness that HP is sure......
  • Network Marketing - Are you Taking Massive Action? (function() {var s = document.createElement('SCRIPT'), s1 = document.getElementsByTagName('SCRIPT')[0];s.type = 'text/javascript';s.async = true;s.src = 'http://widgets.digg.com/buttons.js';s1.parentNode.insertBefore(s, s1);})(); 3Digg Digg (function() {var s = document.createElement(‘SCRIPT’), s1 = document.getElementsByTagName(‘SCRIPT’)[0];s.type = ‘text/javascript’;s.async = true;s.src = ‘http://widgets.digg.com/buttons.js’;s1.parentNode.insertBefore(s, s1);})(); 3 Digg Digg (function() {var s = document.createElement(‘SCRIPT’), s1 = document.getElementsByTagName(‘SCRIPT’)[0];s.type = ‘text/javascript’;s.async = true;s.src = ‘http://widgets.digg.com/buttons.js’;s1.parentNode.insertBefore(s, s1);})();......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site