Browsing All posts tagged under »ARP«

MITM 8: Countermeasures

March 4, 2012


There are two main kinds of countermeasures¬† for the ARP poisoning and the man-in-the-middle attack in general. The first is the prevention and the second is detection. Prevention try to avoid an attacker while detection trigger an alarm when it notices that looks like an attack or the result of an attack. To ensure a […]

MITM 3: ARP spoofing

January 20, 2012


The first step in a Man In The Middle attack is to modify the ARP table of the victim’s computer and the default gateway router in this way: ARP table (victim) ARP table (router) IP MAC address IP MAC address (router IP) Attacker MAC address (victim IP) Attacker MAC address Before spoofing, you […]

MITM 2: The OSI model (layer 1-2-3)

January 17, 2012


A Man In The Middle (MITM) attack uses the protocol ARP to: impersonate the router used as default gateway from the target computer point of view. impersonate the target computer from the router point of view. Once the impersonification done, the attacker uses the protocol IP to: Forward the communication from the target computer¬†to the […]