ARP Attack Flashcards

(12 cards)

1
Q

What does ARP stand for?

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of ARP?

A

Maps IP addresses to MAC addresses on a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an ARP attack?

A

When an attacker sends fake ARP messages to manipulate IP-to-MAC mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ARP spoofing (ARP poisoning)?

A

Attacker sends false ARP messages to associate their MAC with another device’s IP, often the gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can ARP attacks lead to a MITM?

A

By redirecting traffic through the attacker, allowing interception and modification of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can ARP attacks cause DoS?

A

By poisoning ARP tables, devices cannot reach the correct gateway, disrupting network access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name two consequences of ARP attacks.

A

Sensitive data theft and network downtime/DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name three mitigation techniques for ARP attacks.

A

Static ARP entries, Dynamic ARP Inspection (DAI), encrypted protocols (HTTPS/SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are ARP attacks dangerous on local networks?

A

They allow attackers to intercept, modify, or block network traffic without detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARP Spoofing

Quick Way to Remember
Spoofing = the trick / attack
Poisoning = the corrupted tables / result

A

Definition: The act of sending fake ARP messages to a network to pretend your MAC address is another device’s (often the gateway).

Purpose: To trick devices into sending traffic through the attacker (MITM).
Focus: The action of impersonating a device.

Example:
**Attacker sends ARP messages claiming “I am the gateway” → ARP spoofing.

Devices update their ARP tables incorrectly → ARP poisoning.

Quick Way to Remember
Spoofing = the trick / attack
Poisoning = the corrupted tables / result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARP Poisoning

Quick Way to Remember
Spoofing = the trick / attack
Poisoning = the corrupted tables / result

A

Definition: The result of ARP spoofing, where the ARP cache/tables of devices are corrupted with false MAC-IP mappings.
Purpose: Causes devices to send traffic to the wrong MAC address.
Focus: The effect on the network (tables are “poisoned”).

Example:**
Attacker sends ARP messages claiming “I am the gateway” → ARP spoofing.

Devices update their ARP tables incorrectly → ARP poisoning.

Quick Way to Remember
Spoofing = the trick / attack
Poisoning = the corrupted tables / result

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ARP Attack Mitigation

A

ARP Attack Mitigation
Static ARP Entries
Manually configure critical devices with fixed IP-to-MAC mappings.
Pros: Prevents ARP spoofing for those devices.
Cons: Hard to manage in large networks.
Dynamic ARP Inspection (DAI)
Switches verify ARP messages against a trusted database before updating ARP tables.
Pros: Blocks invalid ARP messages automatically.
Requires: Managed switches that support DAI.
Use Encrypted Protocols
Use HTTPS, SSH, VPNs, or TLS to protect data even if intercepted.
Network Segmentation / VLANs
Isolate sensitive devices in separate network segments to limit ARP attack scope.
Intrusion Detection / Prevention Systems (IDS/IPS)
Detect unusual ARP traffic and alert administrators or block it.
Regular Monitoring
Check ARP tables for suspicious entries or duplicate IP-MAC mappings.

Mitigation of ARP attacks includes static ARP entries, Dynamic ARP Inspection (DAI), encrypted protocols, VLANs, IDS/IPS, and monitoring. These prevent spoofing, poisoning, and MITM attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly