0% found this document useful (0 votes)
149 views9 pages

ARP & ARP Spoofing Explained

The document discusses Address Resolution Protocol (ARP) and ARP spoofing. ARP is used to map IP addresses to MAC addresses allowing communication between devices on an Ethernet network. It works by broadcasting ARP requests and receiving ARP replies. ARP spoofing is a technique used by attackers to sniff data on a local area network by sending fake ARP messages associating the attacker's MAC address with the IP address of another system on the network. This allows the attacker to intercept and manipulate traffic intended for the spoofed system.

Uploaded by

joseph490
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
149 views9 pages

ARP & ARP Spoofing Explained

The document discusses Address Resolution Protocol (ARP) and ARP spoofing. ARP is used to map IP addresses to MAC addresses allowing communication between devices on an Ethernet network. It works by broadcasting ARP requests and receiving ARP replies. ARP spoofing is a technique used by attackers to sniff data on a local area network by sending fake ARP messages associating the attacker's MAC address with the IP address of another system on the network. This allows the attacker to intercept and manipulate traffic intended for the spoofed system.

Uploaded by

joseph490
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

ARP & ARP SPOOFING

DEMONSTRATED by
Mahzabin Binte
Mustafiz
WHAT is “ARP”

• ARP stands for Address Resolution Protocol

• It translates IP addresses into Ethernet or


MAC addresses

• ARP is completely separate from TCP/IP,


since it
uses only the Ethernet frame in its packets
What are the uses of
ARP
To communicate between two
Ethernet network

To get the Ethernet address of


host

It is used in any type of


broadcast network

It is extensively used by
Ethernet network
ARP Request Packet
MAC address  A46EF459683AB
address of source (PC0)  142.50.1.1
address of destination  142.50.1.2

ARP Reply Packet


MAC address  A46EF459683AB
IP address of destination (PC3) 142.50.1.2
What is ARP Spoofing

Familiar with the name of “ARP


poisoning”

 It is one of the hacking methods


 A technique for attacking an
Ethernet
wired or wireless network
 To allows an attacker to sniff data
frames
on LAN (local area network)
CONCLUSION
References
2. http://www.nextsecurity.net/
3. http://winpcap.polito.it/
 http://www.ietf.org/rfc/rfc0826.txt
 http://www.wikipedia.com

You might also like