What does ARP stand for?
Address Resolution Protocol
What is the purpose of ARP?
Maps IP addresses to MAC addresses on a local network
What is an ARP attack?
When an attacker sends fake ARP messages to manipulate IP-to-MAC mapping
What is ARP spoofing (ARP poisoning)?
Attacker sends false ARP messages to associate their MAC with another device’s IP, often the gateway
How can ARP attacks lead to a MITM?
By redirecting traffic through the attacker, allowing interception and modification of data
How can ARP attacks cause DoS?
By poisoning ARP tables, devices cannot reach the correct gateway, disrupting network access
Name two consequences of ARP attacks.
Sensitive data theft and network downtime/DoS
Name three mitigation techniques for ARP attacks.
Static ARP entries, Dynamic ARP Inspection (DAI), encrypted protocols (HTTPS/SSH)
Why are ARP attacks dangerous on local networks?
They allow attackers to intercept, modify, or block network traffic without detection
ARP Spoofing
Quick Way to Remember
Spoofing = the trick / attack
Poisoning = the corrupted tables / result
Definition: The act of sending fake ARP messages to a network to pretend your MAC address is another device’s (often the gateway).
Purpose: To trick devices into sending traffic through the attacker (MITM).
Focus: The action of impersonating a device.
Example:
**Attacker sends ARP messages claiming “I am the gateway” → ARP spoofing.
Devices update their ARP tables incorrectly → ARP poisoning.
Quick Way to Remember
Spoofing = the trick / attack
Poisoning = the corrupted tables / result
ARP Poisoning
Quick Way to Remember
Spoofing = the trick / attack
Poisoning = the corrupted tables / result
Definition: The result of ARP spoofing, where the ARP cache/tables of devices are corrupted with false MAC-IP mappings.
Purpose: Causes devices to send traffic to the wrong MAC address.
Focus: The effect on the network (tables are “poisoned”).
Example:**
Attacker sends ARP messages claiming “I am the gateway” → ARP spoofing.
Devices update their ARP tables incorrectly → ARP poisoning.
Quick Way to Remember
Spoofing = the trick / attack
Poisoning = the corrupted tables / result
ARP Attack Mitigation
ARP Attack Mitigation
Static ARP Entries
Manually configure critical devices with fixed IP-to-MAC mappings.
Pros: Prevents ARP spoofing for those devices.
Cons: Hard to manage in large networks.
Dynamic ARP Inspection (DAI)
Switches verify ARP messages against a trusted database before updating ARP tables.
Pros: Blocks invalid ARP messages automatically.
Requires: Managed switches that support DAI.
Use Encrypted Protocols
Use HTTPS, SSH, VPNs, or TLS to protect data even if intercepted.
Network Segmentation / VLANs
Isolate sensitive devices in separate network segments to limit ARP attack scope.
Intrusion Detection / Prevention Systems (IDS/IPS)
Detect unusual ARP traffic and alert administrators or block it.
Regular Monitoring
Check ARP tables for suspicious entries or duplicate IP-MAC mappings.
Mitigation of ARP attacks includes static ARP entries, Dynamic ARP Inspection (DAI), encrypted protocols, VLANs, IDS/IPS, and monitoring. These prevent spoofing, poisoning, and MITM attacks.