The Basics of Arpspoofing/Arppoisoning - Page 3
Page 3 of 3 FirstFirst 123
Results 21 to 26 of 26

Thread: The Basics of Arpspoofing/Arppoisoning

  1. #21
    AO Ancient: Team Leader
    Join Date
    Oct 2002
    Posts
    5,197
    Errrrr guys, would we get flame for participating in this discussion of doing these illegal stuff?
    Certainly not.... because it isn't illegal if you own or have permission to do it on the network you are attempting it on. Now, of course, if you were to start talking in specific terms about a network that you don't have authority to do this kind of thing on then, yes, you might receive a little "flak". So I guess it's all a matter of how you word it....
    Don\'t SYN us.... We\'ll SYN you.....
    \"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides

  2. #22
    Trumpet-Eared Gentoo Freak
    Join Date
    Jan 2003
    Posts
    992
    moonlight_x,

    This site is for security-minded people, and as we all know the thin line between these two possible worlds ( legal - illegal ) is a matter of moral, i guess.
    The reason we share this is to educate, help (call it what you want) and to test or use it in safe or trusted environments. If some ass uses these techniques in real-life big networks, he's even a bigger ass than i thought.

    I do test too, I do want to learn all about security, I try to learn to hack too, but for me this stays inside my lan. What others do is their problem.

    Cheers,
    Come and check out our wargame-site @ http://www.rootcontest.org
    We chat @ irc.smdc-network.org #lobby

  3. #23
    King Tutorial-ankhamun
    Join Date
    Jul 2004
    Posts
    897
    How is it illegal? The guy is doing it on his own network to understand how it works.

  4. #24
    Senior Member
    Join Date
    Nov 2001
    Posts
    1,255

    Re: Re: Re: The Basics of Arpspoofing/Arppoisoning

    Originally posted here by Irongeek
    I would be interested in writing such a tutorial, but doubt I have the resources to do it justice. I Know of a few ways ARP spoofing can be used for DoS, (like spoofing the gateway and turning off packet forwarding, or assuming the MAC address of an antenna in an Axon system) and I have ideas for possible solutions, but I dont have the privileges on my network to really test them to make sure they the fixes work.
    This is perhaps why so many tutorial writers here opt to develop tutorials based on how to break (which isn't necessarily security). To my mind it isn't really a security tutorial until you show a person how to stop it from being attacked/broken in this manner. You could at least amend your current tutorial and discuss how to secure it against MITM attacks. I'll give ya a big hint on where to start: All major OSes have built-in capability that would render ARP poisoning/MITM attacks useless.
    Chris Shepherd
    The Nelson-Shepherd cutoff: The point at which you realise someone is an idiot while trying to help them.
    \"Well as far as the spelling, I speak fluently both your native languages. Do you even can try spell mine ?\" -- Failed Insult
    Is your whole family retarded, or did they just catch it from you?

  5. #25
    King Tutorial-ankhamun
    Join Date
    Jul 2004
    Posts
    897
    Well, I could think of using static arp tables, but that would be a bitch to maintain in a decent sized network. You could do in between certain critical boxes however. Using Arpwatch is also hand for spotting when this kind of shenanigans is going on.

  6. #26
    Junior Member
    Join Date
    Aug 2002
    Posts
    25
    If you have a decent programmable switch, you could set up rules so a certain port on the switch only allows packets of a certain MAC adress. If you don't often move computers on your network, I think this could be a protection against mitma. It requires some bookkeeping of the port-MAC adress tables, but like I said, if you don't move your clients too much, it not a big deal. If you want to do mitma you would have to hack the switch.
    There are 10 kinds of people, those who can read binary, and those who can\'t.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides