05.08.2013 Views

Download - D-Link

Download - D-Link

Download - D-Link

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Destination<br />

address<br />

Ethernet Header<br />

Source address Ethernet<br />

type<br />

H/W type Protocol<br />

type<br />

H/W<br />

address<br />

length<br />

Protocol<br />

address<br />

length<br />

Gratuitous ARP<br />

Operation Sender H/W<br />

address<br />

Sender<br />

protocol<br />

address<br />

Target H/W<br />

address<br />

Target<br />

protocol<br />

address<br />

(6-byte) (6-byte) (2-byte) (2-byte) (2-byte) (1-byte) (1-byte) (2-byte) (6-byte) (4-byte) (6-byte) (4-byte)<br />

FF-FF-FF-FF-FF-FF 00-20-5C-01-11-11 806 ARP reply 00-20-5C-01-11-11 10.10.10.254 00-20-5C-01-11-11 10.10.10.254<br />

Table - 5<br />

A common DoS attack today can be done by associating a nonexistent or any specified MAC address to the IP address of the<br />

network’s default gateway. The malicious attacker only needs to broadcast ONE Gratuitous ARP to the network claiming it is the<br />

gateway so that the whole network operation will be turned down as all packets sent through the Internet will be directed to the<br />

wrong node.<br />

Likewise, the attacker can either choose to forward the traffic to the actual default gateway (passive sniffing) or modify the data<br />

before forwarding it (man-in-the-middle attack). The hacker fools the victims PC to make it believe it is a router and fools the<br />

router to make it believe it is the victim. As can be seen in Figure-5 all traffic will be then sniffed by the hacker without the users<br />

knowledge.<br />

Figure - 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!