ARP Spoofing & Abnormality Detection
Overview
The Address Resolution Protocol (ARP) is frequently targeted for attacks like MITM and DoS.
ARP attacks often use broadcast communication, aiding in detectability via packet sniffing.
How Address Resolution Protocol Works
ARP Basics: Hosts need the MAC address to send data, obtained through ARP requests.
Process Steps:
Host A checks ARP cache or broadcasts an ARP request if the IP isn’t found.
Host B replies with its IP-MAC mapping, updating Host A’s ARP cache.
ARP Poisoning & Spoofing
ARP Cache Poisoning: Attackers send false ARP messages to corrupt caches, redirecting traffic.
Attack Steps:
Attacker sends forged ARP messages to the victim and router, altering their ARP tables.
If the attacker forwards traffic, they intercept and modify data, enabling MITM attacks.
Detection & Prevention
Detection Techniques:
Monitor for unusual ARP traffic patterns (e.g., repetitive ARP requests).
Track IP-MAC inconsistencies to spot potential spoofing.
Prevention Controls:
Static ARP Entries: Prevents ARP cache poisoning, though it increases maintenance.
Port Security on Switches/Routers: Blocks unauthorized devices attempting spoofing.
Practical Detection Steps Using tcpdump and Wireshark
Install tcpdump (if not present):
sudo apt install tcpdump -yCapture ARP Traffic:
sudo tcpdump -i eth0 -w filename.pcapngAnalyze with Wireshark:
wireshark ARP_Spoof.pcapngWireshark Filters:
Filter ARP Requests:
arp.opcode == 1Filter ARP Replies:
arp.opcode == 2Detect Duplicates:
arp.duplicate-address-detected && arp.opcode == 2
Examine IP-MAC Anomalies:
Use
arp -aon Linux to check IP-MAC mappings:arp -a | grep 50:eb:f6:ec:0e:7f arp -a | grep 08:00:27:53:0c:ba
Filter in Wireshark:
Track suspicious MAC interactions:
eth.addr == 50:eb:f6:ec:0e:7f or eth.addr == 08:00:27:53:0c:ba
Last updated