internet.com
You are in the: Small Business Computing Channelarrow View Sites +
Small Business Technology
» ECommerce-Guide | Small Business Computing | Webopedia | WinPlanet |  »Close
Webopedia.com
Enter a word for a definition... ...or choose a computer category.
 
 

menu
   Home
   Term of the Day
   New Terms
   Pronunciation
   New Links
   Quick Reference
   Did You Know?
   Categories
   Tech Support
   Webopedia Jobs
   About Us
   Link to Us
   Advertising
  

talk to us
   Submit a URL
   Suggest a Term
   Report an Error

internet.com
Developer
International
Internet Lists
Internet News
Internet Resources
IT
Linux/Open Source
Personal Technology
Small Business
Windows Technology
xSP Resources
Search internet.com
Advertise
Corporate Info
Newsletters
Tech Jobs
E-mail Offers
commerce
  Be a Commerce Partner
 
 
 
 
 
 
 
 
 
 
 
 
 
 

ARP spoofing
Last modified: Tuesday, August 31, 2004 

(n.) Also referred to as ARP poison routing (APR) or ARP cache poisoning, a method of attacking an Ethernet LAN by updating the target computer’s ARP cache with both a forged ARP request and reply packets in an effort to change the Layer 2 Ethernet MAC address (i.e., the address of the network card) to one that the attacker can monitor. Because the ARP replies have been forged, the target computer sends frames that were meant for the original destination to the attacker’s computer first so the frames can be read. A successful APR attempt is invisible to the user.

E-mail this definition to a colleague


For internet.com pages about ARP spoofing . Also check out the following links!

Related Links

An Introduction to ARP Spoofing
A discussion of ARP spoofing and its key elements. Basic understanding of networks is required to understand this paper. (pdf)

Protecting Your Network From ARP Spoofing-Based Attacks
In order to understand how you can protect yourself from ARP spoofing-based attacks, you must understand some fundamentals about how systems on Ethernet-based networks communicate. (pdf)

The Ingredients to ARP Poison
This article uses a practical example to show how malicious hackers can break into a network.

related categories

Ethics

Networks

Security

related terms

ARP

Ethernet

IP spoofing

local-area network

MAC address

packet


webopedia
Give Us Your
Feedback




JupiterWeb networks:

internet.comearthweb.comDevx.com graphics.com

Search JupiterWeb:

Jupitermedia Corporation has two divisions:
Jupiterimages andJupiterWeb


Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Jupitermedia Corporate Info | Newsletters | Tech Jobs | Shopping | E-mail Offers