Site icon LIFARS, a SecurityScorecard company

What is Address Resolution Protocol (ARP) poisoning?

Cybersecurity Professional Set Rules for Key Creation

Cybersecurity Professional Set Rules for Key Creation

ARP is a protocol that is used to resolve IP addresses to MAC addresses (globally unique numbers). ARP poisoning also known as ARP spoofing is an attack you can use to insert a communication across the network. This allows you to sniff any traffic going between the targets on the internet. If sensitive information, such as credit card details and passwords are sent unencrypted, then the targets can have a very bad day.

How does ARP Poisoning Work

Every computer connects to the network using an ARP table. This table contains IP addresses and their corresponding MAC addresses. Hence when you want to communicate with a certain IP address, your system refers to the respective MAC address. You can check your ARP table in Linux using the command “ARP”, while in windows, it is “ARP –a”.

This table shows up all the devices with whom you have communicated with on Network. Hence the system stores the IP address and respective MAC address of all the connected IP in this table and can refer to them time and again.

If you want to check the status of another system, using the ping command, the system sends a broadcast command on the network. Once the system gets the MAC address, it sends the ping and it saves it for future reference in the ARP table.

If this is attacked, the communication being sent to the real router is redirected to the attacker. This can allow attackers to modify the MAC and send it to the network. When any other system requests for the MAC of the system a different MAC (incorrect MAC) is floated in the network.

How to protect from ARP attack

With increasing attacks on organizations, it is necessary to ensure certain features which can protect the systems from ARP Attacks.

Conclusion

ARP has always been and is still very much prone to ARP Poisoning attacks. As the address resolution mechanism is an unavoidable network necessity, defense mechanisms need essentially to be implemented for utmost protection.

A high percentage of methods have been implemented to salvage against the spoofing attacks, yet a few soft spots need to be addressed. On the whole, it would be prudent to conclude the fact that almost all the mitigation software available presently is confined to work with specific kernels and some require relentless traffic filtering.

Exit mobile version