Network Security – Arp spoofing



So…. what is arp spoofing (poisoning)…. and what are it’s implications? ARP spoofing involves tricking a machine into thinking that you’re machine is, yet another. Let’s put this in IP address terms. Let’s say that 192.168.0.1 is the default gatway on the network and 192.168.0.150 is our target. We are given another network address – say 192.168.0.250…. Arp spoofing would tell 192.168.0.150 that OUR network adapter is the place to send information destined for 192.168.0.1, (and we could also tell 192.168.0.1 that WE are the rightful recipient of data sent to 192.168.0.150). These is done by offering up our MAC address as the legitimate desitination to each machine through a crafted ARP response.


Now, on first reading all of this you think….. wow that sounds hard. Actually there is software readily available that does this in just a few clicks (or with a simple command line syntax.) So, it’s VERY easily done once you’re in the same subnet as the machines that are targetted. In fact, it’s possible to arp-spoof an entire subnet this way, say capturing all traffic from the subnet to the gateway. Once all that traffic is routed through the attacking machine, then…. it can be analyzed.

There is software that quickly and easily collects passwords from this stream of data, or perhaps logs web addresses, captures mail transfered, or can even alter data in the stream (maybe replacing images on a web page or directing you to a page other than you intended.)

So basically this means that ANY untrusted machine connected to your LAN (as long as it’s on your subnet or “upstream” towards the internet), could easily sniff any and all data flowing through the network. Of course, if the hostile machine is upstream, it could only sniff traffic moving outside of the LAN to the router to the internet for instance.

Related Posts

Blog Traffic Exchange Related Posts
  • So who is behind Windows Police Pro Virus / Rogue Security Software? As I've seen the continuing FLOOD of searches for some way to Remove Windows Police Pro, I've been starting to wonder at the who is behind this particular piece of junk software. These programs aren't written by your average ordinary virus writer, there is really too much spit and polish......
  • Florida leads in Sony Rootkit infections.... According to the securityfix, Florida leads the nation in the number of networks with signs of computers infested with the sony rootkit. In total, 12,588 networks in Florida seem to have computers with the rootkit. Now, these numbers could reflect as few as one machine per network.... or as many......
  • Network Security guide for the home or small business network - Part 11 - Why? Alright, so you're still reading this series and you're thinking. Look, I'm not protecting national security secrets. All I'm doing is (running a business|emailing my grandkids|using the web for research). True, good point. You're not at the defense department. OK. Let's say you just use your computer for email and......
Blog Traffic Exchange Related Websites
  • Gators' Winning Streak Ends with a 32-13 Alabama Victory With Alabama and Florida both 12-0 for the season, both teams knew that only one could remain undefeated after Saturday's game. That team was Alabama, reigning over Florida 32-13, and knocking the Gators to 12-1 for the season. In the Georgia Dome, 75,514 fans turned out to see Alabama......
  • Weight Tracking (Last Attempt) Total Weight Lost: 58lbs Here is my weight tracking page... It will evolve as I get more accustomed to my new lifestyle, but for starters if you want to know about the Jumpstart Medicine weight loss program that I am following read this post WeightLadder Reset — 390lbs and Starting......
  • Eagle Lake Eagle Lake is located in: Susanville, CA Phone: (530) 825-3212 About the Lake: With fish weighing in at around 5 pounds each, this is one of the most popular lakes in California. This is the second largest natural lake that can be found in California and offers a wide variety......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site