3 - Network- & Transport-Layer Security (Eavesdropping) Flashcards
Describe the Man-in-the-Middle attack based on ARP.
ARP messages are kept in ARP cache of hosts.
- Alice broadcasts an ARP request to find Bob.
- Attacker respond to Alice saying it is Bob, but giving its own MAC.
- Alice updates her ARP cache and send messages to attacker.
- Attacker redirects Alice’s and Bob’s messages using ARP spoofing.
MitM attack is not a thread because the attacker must be inside the local network. Explain why this is false.
It is false because an external attacker must only find a single vulnerable host within the local network to become an insider.
What are other attacks based on ARP?
ARP Cache Overflow: flood host with ARP replies.
ARP Storm: poison the caches with broadcast addresses (bring network performance down).
DoS: update ARP cache for all hosts with non-existing MAC addresses.
What are the defenses against ARP poisoning?
Switches can use IP-MAC-Port binding, accepting only fixed MAC addresses with fixed IPs at fixed Ethernet ports.