Internet, Cyber Security Attacks and ARP Spoofing Attack

In this blog, we will cover the contents of the various types of security attacks, also briefly explain the ARP (Address Resolution Protocol) Spoofing attack, and many more.

Introduction

The Internet has been one of the most important and crucial needs of people in this rapidly growing world of modernization. 

As its importance is growing day by day different types of vulnerabilities and security attacks are also getting high which has become a major issue on the internet. 

The Internet plays a major role in keeping communication going through different sites and sources, many people perform different smooth operations and activities with the help of the internet and keep their sensitive information and data on the internet but as we all know that internet is not fully trustable and reliable and have different types of malware and vulnerabilities occurs due to which different attackers and hackers gain access through people sensitive, financial and personal data which will be the major advantage for the attackers and the huge loss for the owner. 

Different types of cyber-attacks have been emerging rapidly which has become a severe problem and one of the main attacks among them is ARP Spoofing.

ARP Spoofing

ARP Spoofing is a vulnerable type of attack that has become one of the major problems in the local area network (LAN) and it leads to various other harmful attacks. 

It is a malicious attack that sends falsified ARP messages over a LAN and leads to the associated linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network. 

It is generally a technique used by attackers to perform cache poisoning by putting incorrect IP to MAC address mappings in the victim’s ARP cache. 

ARP Spoofing Attack

ARP Spoofing Attack


It is divided into two forms namely that is request attack and response attack. 

In the request attack, the attackers transmit an ARP request message with a fake source IP-MAC in the ARP header. 

When the receiver receives the spoofed ARP message the ARP cache table gets updated with the attacker’s fake IP-MAC pair. 

After that when the victim sends its subsequent packets to the fake IP, the packets will be destined to the MAC of the host created or generated by the attacker in the fake IP-MAC pair. 

In this way, the attacker can change or deny the traffic sent to a user in the network. 

In the case of a response attack, the attackers will either respond to normal ARP request with fake ARP replies that map the next-hop IP to the attacker's MAC address or sends spoofed ARP replies without having the issue of a request. 

There are generally different types of attacks launched by ARP spoofing due to which severe harm can be caused to the LAN. 

The different types of ARP attacks carried out by ARP spoofing to create different vulnerabilities are listed below:

Types of Attacks

Man-in-the-Middle (MITM) attack

Man-in-the-Middle (MITM) attack is an active eavesdropping technique. 

Here a hacker exploits ARP Cache Poisoning to capture network traffic between two nodes. 

In this case, if a communication session between two devices X and Y is going on then the attacker fakes X by pretending to be Y. It means that whenever X tries to send information to Y, it actually sends information to the attacker who can change and modify the information according to the attacker and forwards the information to Y to keep the communication going on. The attacker can go through all the sensitive information and data and can change/modify them before forwarding the data to Y. 

The hacker can capture all the network traffic and can also sniff passwords or hijack the secured Internet Sessions. 

This type of attack is also known as “Bucket Bridge Attack”, “Fire Brigade Attack”, “Monkey in the Middle Attack” etc.

Denial Of Service (DOS) attack

It is a type of attack on a networking structure where it disables a server from servicing its clients. 

It attempts to slow down the server by sending millions of requests and also creates flooding on a server with large packets of invalid data or sending requests with an invalid or spoofed IP address. 

In this type of attack, the attacker will prevent the two communicating hosts from getting connected to each other. 

The malicious machines create a large number of unknown or fake identities which is it makes system resources unreachable to its intended users. 

The attack soaks the target machine with outward communications requests and the server cannot get respond to authentic traffic. 

The response comes so slowly that it is like not responding at all.

Connection Hijacking

Packet or Connection Hijacking is a type of method where connected nodes can be victimized into getting their connection changed and taking full access to it; it allows an attacker to take control of the connection between two computers. 

This type of attack uses ARP poisoning to steal sessions IDs and allows the attackers to get access to private systems and data connection hijacking. 

This type of attack is usually performed to attack the social network website, and banking websites to gain access to the websites and valid information provided from that site. 

It plays a major role in stealing the confidential and sensitive information which passes through the network. It can steal and capture messages without the knowledge of the senders. 

The big advantage of this type of attack is that it does not have to break any defense or security firewalls, it just has to keep listening over the network and can take control of any type of valid sessions over them.

Cloning

MAC addresses were meant to be globally unique identifiers for every network interface which were burned into the ROM of each interface and could not be changed. 

But nowadays, MAC addresses can easily be changed without spoofing the software, by using a single variable to “ifconfig”, the interface configuration program for the O.S. 

An attacker could DOS a target computer, then assigns themselves as the IP and MAC of the target computer and collects all the frames and sensitive information for the target as they wanted to do. This is the process involved in cloning. 

The main reason for performing an ARP spoofing attack is to intercept data frames on a network, modify the traffic and stop all the traffic. 

It is one of those attacks that can be performed easily without any type of difficulties or disruptions. 

It can damage and take information secretly without the knowledge of the user due to which it can be taken as one of the most dangerous attacks. 

The current scenario of ARP spoofing is not dangerous as before because different types of tools and resources are being implemented to control the attack but as we all know that “Everything is not perfect”, different types of holes and improper functions are still there due to which the tools and resources also cannot completely avoid the attacks properly.

Background

Address Resolution Protocol is also known as ARP is a stateless protocol and one of the most popular communication protocols in the local area network (LAN)which lies under the network layer on an open system interconnections (OSI) model. 

It is one of the most important protocols in Transmission Control Protocol (TCP)/Internet Protocol (IP) and is used to associate the IP address of the network layer to the MAC address of the data link layer. 

With the help of this protocol, the total number of hosts connected to the LAN can be identified and several MAC addresses to IP addresses can also be discovered, in a LAN environment. 

ARP is performed by sending a message request called broadcast to get the MAC to address the IP address. 

While carrying out the operations each device in the network receives the message and compares it with its IP address and if there is a match between the IPs then the generated ARP will be known as unicast and the other devices which are identified and do not match the IP’s then such packets will be dropped immediately. 

After that, the IP-MAC address is stored in the ARP cache table of any network host. The main weakness of ARP is that it is not designed with security features and it lacks the features of authentication and integrity and does not support it due to which it can easily be exploited and different hackers and attackers can go through the sensitive data and information which will be great loss and harm. 

ARP can easily be spoofed due to which it is highly susceptible to spoof and poison attacks.

ARP Explained

ARP Explained



ARP Spoofing is an OSI Layer 2 attack that exploits the statelessness and vulnerability of the protocol and makes network hosts susceptible to different issues and generates serious outcomes for any user. 

These types of attacks are performed to take important information and empower destructive gathering to catch, alter or even stop the information exactly anytime even if it is in the way of traveling to its destination.

An ARP poisoning is a kind of hacking technique and is carried out when an attacker sends a fake ARP request or ARP reply to the LAN which leads to a change in the ARP cache table that is connected with the host IP address to the attacker’s MAC address. 

This enables the attacker to receive all the packets connected between the target host and attacker in the LAN and after that, the attacker can get the information and modify the packets flowing in the LAN. 

They can get access to sensitive data just like an authorized person can get access to their network. 

The attackers without any knowledge of the authority can extract sensitive information. 

There are generally two types of countermeasures to notice the attack: detection and prevention systems. 

Detection systems detect the attack by sounding an alarm when an attack is detected and prevention systems try to prevent or stop the attack from happening. 

There are generally different types of attacks that are encouraged by ARP Spoofing to attack the ARP and they are Dos attack, MITM attack, MAC flooding, MAC duplicating, MAC address spoofing, session hijacking, etc. 

To make the attack successful different types of attacking tools are used which are listed below in detail.

ARP Poisoning

ARP Poisoning

Tools used for ARP Spoofing Attack

ARPwner

ARPwner is a tool that is used for ARP poisoning and DNS poisoning attacks. 

It has a simple GUI and a plugin system to filter the information gathered. 

It also consists of an implementation of SSLtrip and is fully coded on python and on GitHub, which can be modified according to the need of attackers. 

This tool was developed by Nicholas Trippar at BlackHat USA in 2012.

Arpoison

Arpoison is a network analyzer that sends ARP packets to/from specified MAC and IP addresses. 

It was created by Steve Buer who developed this tool to analyze Ethernet traffic inside a local network using a switch. 

This tool sends custom ARP packets and bogus ARP replies to the local network.

Ettercap

Ettercap is an efficient tool for man-in-the-middle attacks on LAN. 

It is responsible for sniffing live connections, content filtering, and different other tricks. 

It includes different features for network and host analysis and also supports active and passive separation of many protocols even the ciphered ones. 

It is capable of performing attacks against the ARP protocol. It can infect, replace and delete data in a connection and captures passwords for different protocols like FTP, HTTP, POP, SSH1, and many others. 

It acts as a Swiss army knife for ARP poisoning and network sniffing. It consists of filters and plug-ins which can perform all sorts of network tasks. 

Ettercap can run on Linux, BSD, Mac OS X, and Windows XP/2003/2007/2008 and also can work on wireless (802.11) and wired LANs.

Dsniff 

It is a combination of password sniffing and network traffic analysis tool commonly known as packet sniffer which was developed by Dug Song to analyze different application protocols and extract appropriate information which can take over various protocols like FTP, SMTP, HTTP, mailsnarf, urlsnarf, and passively monitor sensitive information on a network for gathering interesting data like passwords, e-mail IDs, logs, etc.

Post a Comment

0 Comments