Network Security – Arp spoofing



So…. what is arp spoofing (poisoning)…. and what are it’s implications? ARP spoofing involves tricking a machine into thinking that you’re machine is, yet another. Let’s put this in IP address terms. Let’s say that 192.168.0.1 is the default gatway on the network and 192.168.0.150 is our target. We are given another network address – say 192.168.0.250…. Arp spoofing would tell 192.168.0.150 that OUR network adapter is the place to send information destined for 192.168.0.1, (and we could also tell 192.168.0.1 that WE are the rightful recipient of data sent to 192.168.0.150). These is done by offering up our MAC address as the legitimate desitination to each machine through a crafted ARP response.


Now, on first reading all of this you think….. wow that sounds hard. Actually there is software readily available that does this in just a few clicks (or with a simple command line syntax.) So, it’s VERY easily done once you’re in the same subnet as the machines that are targetted. In fact, it’s possible to arp-spoof an entire subnet this way, say capturing all traffic from the subnet to the gateway. Once all that traffic is routed through the attacking machine, then…. it can be analyzed.

There is software that quickly and easily collects passwords from this stream of data, or perhaps logs web addresses, captures mail transfered, or can even alter data in the stream (maybe replacing images on a web page or directing you to a page other than you intended.)

So basically this means that ANY untrusted machine connected to your LAN (as long as it’s on your subnet or “upstream” towards the internet), could easily sniff any and all data flowing through the network. Of course, if the hostile machine is upstream, it could only sniff traffic moving outside of the LAN to the router to the internet for instance.

Related Posts

Blog Traffic Exchange Related Posts
  • So who is behind Windows Police Pro Virus / Rogue Security Software? As I've seen the continuing FLOOD of searches for some way to Remove Windows Police Pro, I've been starting to wonder at the who is behind this particular piece of junk software. These programs aren't written by your average ordinary virus writer, there is really too much spit and polish......
  • Network Security guide for the home or small business network - Part 15 - Security Through obscurity I remember many years ago watching a Dr. Who episode where a very important key was "hidden" in a display of many other keys. Kind of like hiding a tree in a forest. This concept is "security by obscurity". Generally this is considered a bad approach to security. It is......
  • Florida leads in Sony Rootkit infections.... According to the securityfix, Florida leads the nation in the number of networks with signs of computers infested with the sony rootkit. In total, 12,588 networks in Florida seem to have computers with the rootkit. Now, these numbers could reflect as few as one machine per network.... or as many......
Blog Traffic Exchange Related Websites
  • Sprint, I'm Leaving You for Virgin Mobile Dear Sprint, I have been in love with you for more than 10 years now. On our tenth anniversary you gave me a great gift and made me a Sprint Premier customer. Oh how I looked forward to upgrading my Palm Pre to the new hotness that HP is sure......
  • How to Beat the 10% Compounding Myth I had mentioned previously that for a number of reasons, it's very difficult to earn 10% interest on your money. However, I think I found a way to do it. Of course there's some risk involved. For those who get squeamish about the possibility of losing money, you might......
  • Gators' Winning Streak Ends with a 32-13 Alabama Victory With Alabama and Florida both 12-0 for the season, both teams knew that only one could remain undefeated after Saturday's game. That team was Alabama, reigning over Florida 32-13, and knocking the Gators to 12-1 for the season. In the Georgia Dome, 75,514 fans turned out to see Alabama......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site