ARP spoofing is a technique whereby an attacker sends fake ("spoofed") Address Resolution Protocol (ARP) messages onto a Local Area Network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host (such as the default gateway), causing any traffic meant for that IP address to be sent to the attacker instead.
ARP spoofing may allow an attacker to intercept data frames on a LAN, modify the traffic, or stop the traffic altogether. Often the attack is used as an opening for other attacks, such as denial of service, man in the middle, or session hijacking attacks.
The attack can only be used on networks that make use of the Address Resolution Protocol (ARP), and is limited to local network segments.
Other articles related to "arp spoofing, arp":
... ARP spoofing can also be used for legitimate purposes ... ARP spoofing can also be used to implement redundancy of network services ... A backup server may use ARP spoofing to take over for a defective server and transparently offer redundancy ...
... Because ARP does not provide methods for authenticating ARP replies on a network, ARP replies can come from systems other than the one with the required Layer 2 address ... An ARP proxy is a system which answers the ARP request on behalf of another system for which it will forward traffic, normally as a part of the network's design, such as for a dialup internet ... By contrast, in ARP spoofing the answering system, or spoofer, replies to a request for another system's address with the aim of intercepting data bound for ...
Famous quotes containing the word arp:
“Soon silence will have passed into legend. Man has turned his back on silence. Day after day he invents machines and devices that increase noise and distract humanity from the essence of life, contemplation, meditation.... Tooting, howling, screeching, booming, crashing, whistling, grinding, and trilling bolster his ego. His anxiety subsides. His inhuman void spreads monstrously like a gray vegetation.”
—Jean Arp (18871948)