ARP attackARP spoofing is achieved by forging IP addresses and MAC addresses, which can generate a large amount of ARP traffic in the network to block the network, attackers can change the IP-MAC entries in the ARP cache of the target host as long as they continuously generate forged ARP response packets, resulting in network interruptions or man-in-the-middle attacks.
Modify the Mac address of the NIC in Windows Vista to easily defend against ARP attacks. After research, there is a new way to deal with arp viruses in Windows Vista. It can not only defend against arp attacks, but also significantly improve the LAN security of Windows Vista.
To handle ARP spoofing, first bind the IP address and MAC address of the gateway Nic.
First, Enter cmd in the Start Menu. Press Ctrl + Shift + Enter to escalate the permission to the system administrator. Here, use the ARP command in Windows Vista to complete the binding. Run the arp-d command in cmd to delete the IP address and MAC ing table of the current Gateway, and then run the arp-a command to update the ing between the IP address and MAC address of the gateway. Finally, use arp-s <gateway IP address> <gateway MAC address>, for example, arp-s 192.168.14.192 00-d0-88-00-6c-dd operation 1:
If you use residential broadband, you can also remove your computer from the lan. Enter net config server/hidden: yes in the cmd command prompt, if you want the other party to view the network neighbor, you can enter net config server/hidden: no again, as shown in operation 2.
ARP attacks mainly exist in LAN networks. If a computer in LAN is infected with an ARP Trojan, the system infected with the ARP Trojan will attempt to intercept the communication information of other computers in the network through ARP spoofing, and thus cause communication faults of other computers in the network. Therefore, the above tips are very helpful to everyone, and I hope you have mastered them.