Questions about this topic? Sign up to ask in the talk tab.

Difference between revisions of "ARP poisoning"

From NetSec
Jump to: navigation, search
(Description)
 
Line 2: Line 2:
 
== Description ==
 
== Description ==
  
[[ARP]] poisoning is an [[MITM attack]] that attempts to change the [[Static ARP configuration#Reading your ARP Tables|arp table]], which holds records of [[IP address|IP addresses]] and their assigned [[MAC|MAC address]].  If these records can be modified, devices will send traffic on a LAN to the MAC address for the host of the assigned [[IP address]].  This allows an attacker to impersonate computers and gateways, and can result in [[sniffing]] a vast majority of network traffic.  Depending on the sniffer's throughput, this may also cause substantial [[packet loss]] if successful.
+
[[ARP]] poisoning is a form of [[network]] [[exploitation]] that attempts to change the [[Static ARP configuration#Reading your ARP Tables|arp table]], which holds records of [[IP address|IP addresses]] and their assigned [[MAC|MAC address]].  If these records can be modified, devices will send traffic on a LAN to the MAC address for the host of the assigned [[IP address]], resulting in a successful [[man in the middle]] attack.  This allows an attacker to impersonate computers and gateways, and can result in [[sniffing]] a vast majority of network traffic.  Depending on the sniffer's throughput, this may also cause substantial [[packet loss]] if successful.
  
 
== Tools ==
 
== Tools ==

Latest revision as of 10:15, 20 October 2012

This article contains too little information, it should be expanded or updated.
Things you can do to help:
  • add more content.
  • update current content.

Description

ARP poisoning is a form of network exploitation that attempts to change the arp table, which holds records of IP addresses and their assigned MAC address. If these records can be modified, devices will send traffic on a LAN to the MAC address for the host of the assigned IP address, resulting in a successful man in the middle attack. This allows an attacker to impersonate computers and gateways, and can result in sniffing a vast majority of network traffic. Depending on the sniffer's throughput, this may also cause substantial packet loss if successful.

Tools