Man in the middle attack

April 2017

ARP attack

One of the most famous man in the middle attacks involves exploiting a weakness in the ARP (Address Resolution Protocol), the goal of which is to help find the IP address of a machine by knowing the physical address (MAC address) of its network card.

The goal of the attack is to intercept two machines on the network and send each one a false ARP packet stating that the other machine's ARP address (MAC address) has changed, the ARP address provided being that of the attacker.

The two target machines will then update their dynamic table called the ARP Cache. We talk about ARP cache poisoning (sometimes ARP spoofing or ARP redirect) to refer to this type of attack.

As such, every time one of the two machines wishes to communicate with the remote machine, the packets will be sent to the attacker, who will transparently send them to the receiving machine.

Related



Ataque MitM
Ataque MitM
Attaque man in the middle (« homme au milieu »)
Attaque man in the middle (« homme au milieu »)
Attacco man in the middle (uomo nel mezzo)
Attacco man in the middle (uomo nel mezzo)
Ataque man in the middle
Ataque man in the middle
Wat betekent front office en back office
Wat betekent front office en back office
Warunki korzystania z serwisu
Warunki korzystania z serwisu
Latest update on October 16, 2008 at 09:43 AM by Jeff.
This document, titled "Man in the middle attack," is available under the Creative Commons license. Any copy, reuse, or modification of the content should be sufficiently credited to CCM (ccm.net).