Network Security – Arp spoofing



So…. what is arp spoofing (poisoning)…. and what are it’s implications? ARP spoofing involves tricking a machine into thinking that you’re machine is, yet another. Let’s put this in IP address terms. Let’s say that 192.168.0.1 is the default gatway on the network and 192.168.0.150 is our target. We are given another network address – say 192.168.0.250…. Arp spoofing would tell 192.168.0.150 that OUR network adapter is the place to send information destined for 192.168.0.1, (and we could also tell 192.168.0.1 that WE are the rightful recipient of data sent to 192.168.0.150). These is done by offering up our MAC address as the legitimate desitination to each machine through a crafted ARP response.


Now, on first reading all of this you think….. wow that sounds hard. Actually there is software readily available that does this in just a few clicks (or with a simple command line syntax.) So, it’s VERY easily done once you’re in the same subnet as the machines that are targetted. In fact, it’s possible to arp-spoof an entire subnet this way, say capturing all traffic from the subnet to the gateway. Once all that traffic is routed through the attacking machine, then…. it can be analyzed.

There is software that quickly and easily collects passwords from this stream of data, or perhaps logs web addresses, captures mail transfered, or can even alter data in the stream (maybe replacing images on a web page or directing you to a page other than you intended.)

So basically this means that ANY untrusted machine connected to your LAN (as long as it’s on your subnet or “upstream” towards the internet), could easily sniff any and all data flowing through the network. Of course, if the hostile machine is upstream, it could only sniff traffic moving outside of the LAN to the router to the internet for instance.

Related Posts

Blog Traffic Exchange Related Posts
  • Florida leads in Sony Rootkit infections.... According to the securityfix, Florida leads the nation in the number of networks with signs of computers infested with the sony rootkit. In total, 12,588 networks in Florida seem to have computers with the rootkit. Now, these numbers could reflect as few as one machine per network.... or as many......
  • WPA and WPA2 cracked 100 times faster The days of relying on WPA or WPA2 as your online layer of wireless security may be numbered. A new technique that makes use of NVIDIA's newer GPU's to do some of hte processing means that it's possible to break "forgotten" keys about 100 times faster than was previously possible.......
  • Network Security guide for the home or small business network - Part 11 - Why? Alright, so you're still reading this series and you're thinking. Look, I'm not protecting national security secrets. All I'm doing is (running a business|emailing my grandkids|using the web for research). True, good point. You're not at the defense department. OK. Let's say you just use your computer for email and......
Blog Traffic Exchange Related Websites
  • Internet Network Marketing - Finding The Right Traffic A big problem that plagues people who start a network marketing business online is they do not know where to get traffic from. I would think the #1 reason why people fail to grow their business online is because they lack traffic. Here are some helpful tips to attract the......
  • Jan07 Review of 2007 Goals and Progress Report I have made through my first full month.  To celebrate I will be reviewing my 2007 RateLadder.com Goals. Jan Yearly Status 2007 Year Ending Account Value $3,615.98 On track, but expectation not yet met Return on Investment (ROI) 15.75% Stretch Goal Exceeded (15.75% is cumulative average and I have 0......
  • The Power Of Google Analytics In Your Marketing (function() {var s = document.createElement('SCRIPT'), s1 = document.getElementsByTagName('SCRIPT')[0];s.type = 'text/javascript';s.async = true;s.src = 'http://widgets.digg.com/buttons.js';s1.parentNode.insertBefore(s, s1);})(); 5Digg Digg (function() {var s = document.createElement(‘SCRIPT’), s1 = document.getElementsByTagName(‘SCRIPT’)[0];s.type = ‘text/javascript’;s.async = true;s.src = ‘http://widgets.digg.com/buttons.js’;s1.parentNode.insertBefore(s, s1);})(); 5 Digg Digg (function() {var s = document.createElement(‘SCRIPT’), s1 = document.getElementsByTagName(‘SCRIPT’)[0];s.type = ‘text/javascript’;s.async = true;s.src = ‘http://widgets.digg.com/buttons.js’;s1.parentNode.insertBefore(s, s1);})();......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site