answersLogoWhite

0

Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning or ARP Poison Routing (APR), is a technique used to attack an Ethernet http://wiki.answers.com/wiki/Ethernet or http://wiki.answers.com/wiki/Wireless_network. ARP Spoofing may allow an attacker to http://wiki.answers.com/wiki/Packet_sniffer http://wiki.answers.com/wiki/Data_frame on a http://wiki.answers.com/wiki/Local_area_network (LAN), modify the traffic, or stop the traffic altogether (known as a http://wiki.answers.com/wiki/Denial-of-service_attack). The attack can only be used on networks that actually make use of ARP and not another method of address resolution.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

What are two potential network problems that can result from ARP operation?

Two potential network problems that can result from ARP (Address Resolution Protocol) operation are ARP spoofing and ARP cache poisoning. In ARP spoofing, an attacker sends false ARP messages to associate their MAC address with the IP address of another device, leading to man-in-the-middle attacks. ARP cache poisoning involves corrupting the ARP cache of a device by injecting incorrect mappings, which can disrupt network communication and redirect traffic maliciously. Both issues can compromise network security and integrity.


How long do ARP entries remain in the ARP cache by default?

The default amount of time for ARP entries to stay in the ARP cache is 10 minutes for referenced entries and 2 minutes for entries that are not referenced.


What happens to the ARP cache when a Cisco router is powered off?

Unless there are static ARP mappings, the cache will be cleared when powered off.


ARP Poisoning?

Address Resolution Protocol (ARP) Poisoning (or ARP Cache Poisoning) modifies the IP address associated with the MAC address of a device. In layman’s terms, it means that a hacker can insert themselves between an endpoint and router (for example) and pretend to be the router to the endpoint and pretend to be the endpoint to the router. All data traffic that is meant to flow between endpoint and router will now pass through the hacker’s device.


What commands do you use to verify the ARP cache on a windows end-system and the ARP table ina Cisco router?

arp -a show arp


How do you obtain mac address of HP Laserjet P2055dn?

Usually you don't need the MAC address directly - except perhaps to improve the documentation in a large network.If you know a device's IP address, you can do a pingcommand; before and after, compare the ARP cache - the one that shows assignments of IP addresses to MAC addresses. In Windows, the steps would be more or less like this:Open a command window arp -d * (this will delete the ARP cache)arp -a (this will show the ARP cache)ping ... (this will connect to the IP address you specify)arp -a (show the ARP cache again. Compare with the previous one.)Usually you don't need the MAC address directly - except perhaps to improve the documentation in a large network. If you know a device's IP address, you can do a pingcommand; before and after, compare the ARP cache - the one that shows assignments of IP addresses to MAC addresses. In Windows, the steps would be more or less like this:Open a command windowarp -d * (this will delete the ARP cache)arp -a (this will show the ARP cache)ping ... (this will connect to the IP address you specify)arp -a (show the ARP cache again. Compare with the previous one.)Usually you don't need the MAC address directly - except perhaps to improve the documentation in a large network. If you know a device's IP address, you can do a pingcommand; before and after, compare the ARP cache - the one that shows assignments of IP addresses to MAC addresses. In Windows, the steps would be more or less like this:Open a command windowarp -d * (this will delete the ARP cache)arp -a (this will show the ARP cache)ping ... (this will connect to the IP address you specify)arp -a (show the ARP cache again. Compare with the previous one.)Usually you don't need the MAC address directly - except perhaps to improve the documentation in a large network. If you know a device's IP address, you can do a pingcommand; before and after, compare the ARP cache - the one that shows assignments of IP addresses to MAC addresses. In Windows, the steps would be more or less like this:Open a command windowarp -d * (this will delete the ARP cache)arp -a (this will show the ARP cache)ping ... (this will connect to the IP address you specify)arp -a (show the ARP cache again. Compare with the previous one.)


What does empty ARP cache indicate?

That the MAC addresses have expired


Where can one find out about arp poisoning?

You can find information about arp poisoning online at the Wikipedia. Once on the page, type "ARP spoofing" into the search field at the top of the page and press enter to bring up the information.


What is the reason for ARP cache to be emptied after a few minutes of inactivity with a host and why is it beneficial?

An ARP cache holds dynamic network and mapping information. Delaying the clearing of this cache is that dynamic information or processes can be left in limbo and become non-removable after a period of time.


What is one layer of security that can be applied to ARP cache entries that could aid countering ARP spoofing?

static gateway address


To make arp more efficient computers save recognized mac to ip address mappings on their hard disks in a database known as?

To make ARP more efficient computers save recognized mac to IP address mappings on their hard disks in a database known as ARP cache. ARP is an network layer protocol / third layer protocol. ARP provides mapping between Logical to physical address.


What does arp -s do in command prompt?

it allows you to create a permanent entry in your cache