ARP allows the network to translate IP addresses into MAC addresses. When one host using TCP/IP on a LAN tries to contact another, it needs the MAC address or hardware address of the host it’s trying to reach. It first looks in its ARP cache to see if it already has the MAC address; if it doesn’t, it broadcasts an ARP request asking, “Who has the IP address I’m looking for?” If the host that has that IP address hears the ARP query, it responds with its own MAC address, and a conversation can begin using TCP/IP. ARP poisoning is a technique that’s used to attack an Ethernet network and that may let an attacker sniff data frames on a switched LAN or stop the traffic altogether. ARP poisoning utilizes ARP spoofing, where the purpose is to send fake, or spoofed, ARP messages to an Ethernet LAN. These frames contain false MAC addresses that confuse network devices such as network switches. As a result, frames intended for one machine can be mistakenly sent to another (allowing the packets to be sniffed) or to an unreachable host (a denial-ofservice, or DoS, attack). ARP spoofing can also be used in a man-in-the-middle attack, in which all traffic is forwarded through a host by means of ARP spoofing and analyzed for passwords and other information.
Saturday, May 11, 2013
Subscribe to:
Post Comments (Atom)
Search
Contents
-
▼
2013
(23)
-
▼
May
(19)
- SQL Injection
- The Purpose of SQL Injection
- Rogue Access Points
- Wireless Hacking Techniques
- Securing Home Wireless Networks
- Linux System
- How ARP Works
- How a Sniffer Works
- Gathering Data from Networks: Sniffers
- Types Of Computer Virus
- Land Attacks,Smurf Attacks,UDP Flooding
- Distributed DOS Attacks
- SYN Attack
- Teardrop
- Ping Of Death
- DOS Attacked
- Movie Download Site List
- ShellCode HandBook Download
- What is Google+ (Google Plus) and do I need it?
-
▼
May
(19)
Visitor
Powered by Blogger.
0 comments:
Post a Comment
Thank You For Comment...