ARP Scanning & Denial-of-Service

We might discern additional aberrant behaviors within the ARP requests and replies. Poisoning and spoofing are central to ARP-based denial-of-service (DoS) and man-in-the-middle (MITM) attacks, but adversaries could also leverage ARP for information gathering. Thankfully, we possess the skills to detect and evaluate these tactics following similar procedures.


ARP Scanning Signs

Typical red flags indicating ARP scanning include:

  • Broadcast ARP requests sent to sequential IP addresses (.1, .2, .3, ...)

  • Broadcast ARP requests sent to non-existent hosts

  • Unusual volume of ARP traffic from a potentially malicious or compromised host

Finding ARP Scanning

By opening ARP_Scan.pcapng in Wireshark and applying the filter arp.opcode, we might observe:

  • ARP Scanning: ARP requests propagated by a single host to all IPs sequentially, symptomatic of ARP scanning (common in scanners like Nmap).

  • Active Hosts Respond: Detected ARP replies from live hosts indicate successful information gathering by the attacker.


Identifying Denial-of-Service

Attackers may:

  1. Use ARP scanning to identify live hosts.

  2. Transition to a DoS attack, contaminating the subnet by manipulating as many ARP caches as possible, or establishing a MITM position.

ARP DoS Tactics

  • Corrupt Router's ARP Cache: Attack traffic focuses on declaring new physical addresses for all live IPs.

  • Duplicate IP Allocations: The attacker assigns 192.168.10.1 to multiple clients, aiming to disrupt communication by corrupting ARP caches and obstructing traffic.


Responding to ARP Attacks

Upon identifying ARP anomalies, the following steps can be taken:

  • Tracing and Identification: Locating the physical machine behind the attack can halt its activities. In some cases, the attacking machine may itself be compromised.

  • Containment: Disconnect or isolate the affected area at the switch or router level to stop further data exfiltration, effectively terminating DoS or MITM attacks.

Note: Link layer attacks may initially seem minor but detecting them can prevent data exfiltration from higher OSI layers.

Last updated