TP-Link TL-SL5428E User Manual page 219

24-port 10/100mbps + 4-port gigabit jetstream l2 managed switch
Hide thumbs Also See for TL-SL5428E:
Table of Contents

Advertisement

As the above figure shown, the attacker sends the fake ARP packets with a forged Gateway
address to the normal Host, and then the Host will automatically update the ARP table after
receiving the ARP packets. When the Host tries to communicate with Gateway, the Host will
encapsulate this false destination MAC address for packets, which results in a breakdown of the
normal communication.
Ejgcvkpi"Icvgyc{"
"
The attacker sends the wrong IP address-to-MAC address mapping entries of Hosts to the
Gateway, which causes that the Gateway cannot communicate with the legal terminal Hosts
normally. The ARP Attack implemented by cheating Gateway is illustrated in the following figure.
As the above figure shown, the attacker sends the fake ARP packets of Host A to the Gateway,
and then the Gateway will automatically update its ARP table after receiving the ARP packets.
When the Gateway tries to communicate with Host A in LAN, it will encapsulate this false
destination MAC address for packets, which results in a breakdown of the normal communication.
Ejgcvkpi"Vgtokpcn"Jquvu"
"
The attacker sends the false IP address-to-MAC address mapping entries of terminal Host/Server
to another terminal Host, which causes that the two terminal Hosts in the same network segment
cannot communicate with each other normally. The ARP Attack implemented by cheating terminal
Hosts is illustrated in the following figure.
Figure 13-11 ARP Attack – Cheating Gateway
207

Advertisement

Table of Contents
loading

Table of Contents