12.07.2015 Views

TL-SL3428_V3_User_Guide - TP-Link

TL-SL3428_V3_User_Guide - TP-Link

TL-SL3428_V3_User_Guide - TP-Link

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 11-11 ARP Attack – Cheating Terminal HostsAs the above figure shown, the attacker sends the fake ARP packets of Host A to Host B, and thenHost B will automatically update its ARP table after receiving the ARP packets. When Host B triesto communicate with Host A, it will encapsulate this false destination MAC address for packets,which results in a breakdown of the normal communication.‣ Man-In-The-Middle AttackThe attacker continuously sends the false ARP packets to the Hosts in LAN so as to make theHosts maintain the wrong ARP table. When the Hosts in LAN communicate with one another, theywill send the packets to the attacker according to the wrong ARP table. Thus, the attacker can getand process the packets before forwarding them. During the procedure, the communicationpackets information between the two Hosts are stolen in the case that the Hosts were unaware ofthe attack. That is called Man-In-The-Middle Attack. The Man-In-The-Middle Attack is illustrated inthe following figure.150

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!