Dns Server - D-Link xStack DES-3800 Series User Manual

Layer 3 stackable fast ethernet managed switch
Hide thumbs Also See for xStack DES-3800 Series:
Table of Contents

Advertisement

How ARP spoofing attacks a network
ARP spoofing, also known as ARP poisoning, is a method to attack an Ethernet network which may allow an attacker to sniff data
frames on a LAN, modify the traffic, or stop the traffic altogether (known as a Denial of Service - DoS attack). The principle of
ARP spoofing is to send the fake, or spoofed ARP messages to an Ethernet network. Generally, the aim is to associate the
attacker's or random MAC addresses with the IP address of another node (such as the default gateway). Any traffic meant for that
IP address would be mistakenly re-directed to the node specified by the attacker.
IP spoofing attacks are caused by Gratuitous ARPs that occur when a host sends an ARP request to resolve its own IP address.
Figure-4 shows a hacker within a LAN to initiate ARP spoofing attack.
IP: 10.10.10.3
MAC: 00-20-5C-01-33-33
C
IP: 10.10.10.1
MAC: 00-20-5C-01-11-11
A
Hacker
Figure-4
In the Gratuitous ARP packet, the "Sender protocol address" and "Target protocol address" are filled with the same source IP
address itself. The "Sender H/W Address" and "Target H/W address" are filled with the same source MAC address. The
destination MAC address is the Ethernet broadcast address (FF-FF-FF-FF-FF-FF). All nodes within the network will immediately
update their own ARP table in accordance with the sender's MAC and IP address. The format of Gratuitous ARP is shown in
Table-5.
xStack DES-3800 Series Layer 3 Stackable Fast Ethernet Managed Switch
Router
Port 3
Port 24
Port 1
A wrong ARP entry spreads over
the network to spoof all PCs
IP: 10.10.10.254
MAC: 00-20-5C-01-54-54
Port 23
Port 2
347
Internet

DNS server

IP: 10.10.10.253
MAC: 00-20-5C-01-53-53
B
IP: 10.10.10.2
MAC: 00-20-5C-01-22-22

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents