Tuesday, 1 April 2014

0 What is ARP Spoofing? ^^^^^^^^^^^^^^^^^^^^^^^ ARP Spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network. Once the attacker’s MAC address is connected to an authentic IP address the attacker will begin receiving any data that is intended for that IP address. ARP spoofing can enable malicious parties to intercept, modify, or even stop data in-transit. ARP spoofing attacks can only occur on local area networks that utilize the Address Resolution Protocol. ARP Spoofing Attacks The effects of ARP spoofing attacks can have serious implications for enterprises. In their most basic application ARP spoofing attacks are used to steal sensitive information. Beyond this, ARP spoofing attacks are often used to facilitate other attacks such as: Denial-of-service attacks: DoS attacks often leverage ARP spoofing to link multiple IP addresses with a single target’s MAC address. As a result, traffic that is intended for many different IP addresses will be redirected to the target’s MAC address, overloading the target with traffic. Session hijacking: Session hijacking attacks can use ARP spoofing to steal session IDs, granting attackers access to private systems and data. Man-in-the-middle attacks: MitM attacks can rely on ARP spoofing to intercept and modify traffic between victims.


0 comments:

Post a Comment