ARP poisoning
Summary
Premise
- can make ARP broadcasts to the network
- switch forwards ARP updates to all users
- reply without request
- MITM in the data link layer
Attack
- broadcast that the gateway IP address is at attacker’s MAC
- all packets from the victim to the gateway are routed to the attacker
Attacker’s Goals
- achieve MITM for other attacks, eg. DNS spoofing -> confidentiality/integrity
- inspect victim’s traffic -> confidentiality
- modify victim’s traffic -> integrity
- drop victim’s traffic, DoS -> availability
Defense
- static ARP entries
- port security - fixed MAC addresses for each switch port
- prevent untrusted devices from joining the network, eg. WPA2
Concept
Address Resolution Protocol(ARP)
- resolves an IP address to a MAC address
- occurs in the data link layer
- a device might know the IP of the next hop, but needs the MAC to tell the switch where to send it
Switch
- has no concept of an IP address
- stores a table mapping the physical port on the switch, to the MAC address of the device connected to that port
ARP table
- maintained by each device(node) on the subnet
- stores mapping from IP address to MAC address
- the nodes update each other’s tables via ARP
- if the mapping for an IP is unknown
- node broadcasts an ARP request, openly asking for the node with that IP to send its MAC
- new device takes over IP
- new node broadcasts its MAC to the subnet, reply without request
ARP poisioning
- attacker can broadcast their own MAC addr
- traffic from the victim is routed through the attacker