ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

14
ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004

Transcript of ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

Page 1: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

ARP Poisoning

Rushad Shaikh

CSCI 5931 Web Security

Spring 2004

Page 2: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

ARP Poisoning Attacks

Topics– Logical Address– Physical Address– Mapping– ARP– ARP Cache Table– ARP Poisoning– Prevent ARP Poisoning

Page 3: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

Logical address

Internetwork address Unique universally In TCP/IP its called IP Address 32 bits long

Physical Address

Local address Unique locally

Page 4: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

Mapping

Delivery of a packet requires two levels of addressing– Logical

– Physical Mapping a logical address to its physical address

– Static Mapping• Table to store information• Updating of tables

– Dynamic Mapping• ARP

– Logical Address to Physical Address

• RARP– Physical Address to Logical Address

Page 5: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

ARP

ARP request– Computer A asks the network, "Who has this IP address?“

Page 6: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

ARP(2)

ARP reply– Computer B tells Computer A, "I have that IP. My Physical Address

is [whatever it is].“

Page 7: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

Cache Table

A short-term memory of all the IP addresses and Physical addresses

Ensures that the device doesn't have to repeat ARP Requests for devices it has already communicated with

Implemented as an array of entries

Entries are updated

Page 8: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

State Queue Attempt Time-out State Queue Attempt Time-out IP Address IP Address Physical Physical AddressAddress

R 5 900 180.3.6.1 ACAE32457342

P 2 2 129.34.4.8

P 14 5 201.11.56.7

R 8 450 114.5.7.89 457342ACAE32

P 12 1 220.55.5.7

F

R 9 60 19.1.7.82 4573E3242ACA

P 18 3 188.11.8.71

Cache Table

Page 9: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

ARP Poisoning

Simplicity also leads to major insecurity– No Authentication

• ARP provides no way to verify that the responding device is really who it says it is

• Stateless protocol– Updating ARP Cache table

Attacks– DOS

• Hacker can easily associate an operationally significant IP address to a false MAC address

– Man-in-the-Middle• Intercept network traffic between two devices in your network

Page 10: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

ARP Poisoning(3a) – Man-In-The-Middle

Page 11: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

ARP Poisoning(3b) – Man-In-The-Middle

Page 12: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

ARP Poisoning(3c) – Man-In-The-Middle

Page 13: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

Prevent Arp Poisoning

For Small Network– Static Arp Cache table

For Large Network– Arpwatch

As an administrator, check for multiple Physical addresses responding to a given IP address

Page 14: ARP Poisoning Rushad Shaikh CSCI 5931 Web Security Spring 2004.

References:

www.watchguard.com/infocenter/editorial/135324.asp www.l0t3k.org/security/docs/arp/