I often hear friends around me saying that the network of my computer has been attacked. There are often some unscrupulous people who use ARP spoofing software to attack others, causing many people to drop the line and even make the entire network paralyzed. In response to this problem, we first come to understand its attack principle and deception principle, and the friends who are deeply hurt are hurry to take a look.
First, the principle of ARP spoofing is as follows:
Suppose such a network, a Hub connects to 3 machines
HostA HostB HostC where
A The address is: IP: 192.168.10.1 MAC: AA-AA-AA-AA-AA-AA
The address of B is: IP: 192.168.10.2 MAC: BB-BB-BB-BB-BB-BB
The address of C is: IP: 192.168.10.3 MAC: CC-CC-CC-CC-CC-CC
Normally C:\\arp -a
Interface: 192.168.10.1 on Interface 0x1000003
Internet Address Physical Address Type
192.168.10.3 CC-CC-CC-CC-CC-CC dynamic
Now suppose HostB starts Sinful ARP spoofing:
B sends a fake ARP reply to A, and the data in this response is the sender's IP address is 192.168.10.3 (the IP address of C), and the MAC address is DD- DD-DD-DD-DD-DD (C's MAC address should have been CC-CC-CC-CC-CC-CC, which was forged here). When A receives a B-forged ARP reply, it updates the local ARP cache (A does not know that it was forged). And A does not know that it is actually sent from B, A here only 192.168.10.3 (C's IP address) and invalid DD-DD-DD-DD-DD-DD mac address, there is no evidence related to criminal B, Haha, so criminals are unhappy.
Now the ARP cache for A machine is updated:
C:\\>arp -a
Interface: 192.168.10.1 on Interface 0x1000003
Internet Address Physical Address Type
192.168.10.3 DD-DD-DD-DD-DD-DD dynamic
This is no small matter. The network circulation of the local area network is not based on the IP address, but is transmitted according to the MAC address. The MAC address of 192.168.10.3 is now changed on A to a MAC address that does not exist. Now A starts Ping 192.168.10.3, the MAC address submitted by the network card is DD-DD-DD-DD-DD-DD, what is the result? The network is unreachable, A can't ping C!!
So, A machine in the LAN repeatedly sends such invalid and fake ARP response packets to other machines, especially to the gateway. NND, serious network congestion begins! The nightmare of the Internet cafe administrator started. My goal and mission is to catch him the first time. However, from the previous statement, it seems that the criminals perfectly exploited the defects of Ethernet and concealed their crimes. But in fact, the above methods have left a clue. Although the ARP packet does not leave the address of HostB, the ethernet frame carrying the ARP packet contains the source address of HostB. Moreover, in the ethernet data frame under normal circumstances, the MAC source address/destination address in the frame header should be paired with the ARP information in the frame data packet, and such an ARP packet is considered to be correct. If it is not correct, it must be a fake package. It can be reminded! But if it matches, it does not necessarily mean that it is correct. Maybe the counterfeiter also takes this step into consideration, and fakes the ARP packet that meets the format requirements but the content is fake. However, it does not matter, as long as the gateway has a network card database with all MAC addresses of this network segment, if it does not match the data in the Mac database, it is also a fake ARP packet. Can also remind criminals to start. Previous 12 Next page Total 2 pages
Application Data is the meaning of application data, application data, this folder
Everyone knows that there is no way to make a sound without installing a sound card
When our computer is accidentally powered off or forced to shut down, it will trigger the boot disk
Some users who use the WinXP system may have encountered this problem: the system a
Three steps to get the DLL file error when the XP system is booting
WinXP can't create a solution for VPN connection
Three major solutions to the lack of virtual memory and nine reasons
Put IE8 shortcuts with "Internet Options" on your desktop
How does WinXP modify the file name in batches? How to modify the file name in batches
How to get rid of stealth killers - computer radiation
What should I do if the WinXP IE homepage cannot be modified?
Experts explain WinXP system optimization acceleration three absolutely
WinXP system C disk space shortage solution
Xp system automatically shuts down regularly, don't forget Shutdown program
What is the user's failure to receive the official version of Win10?
What can I do if Win10 cannot modify the time? Win10 modify system time without permission solution
The use of the magnifying glass in Windows7 and the shortcut key
Windows 8 Consumer Preview Pre-installed App Exposure
Win8 system Metro interface IE10.0 experience No Flash no internet silver
Win8 new home security management function
Win 2003 system various pop-up notifications how to close