The basic function of ARP protocol is to inquire the MAC address of target device through the IP address of target device to ensure the communication.
Based on the ARP protocol of this work characteristics, hackers to the other computer to send a fraudulent nature of the ARP packet, the packet contains a duplicate of the current device MAC address, so that the other in response to the message, due to a simple address repeat error caused by the normal network communication. In general, there are two symptoms of a computer that is attacked by an ARP attack:
1. The dialog box that pops up "XXX segment of this machine is on the address of the XXX section of the network and the address of the section in the net."
2. The computer can not be normal Internet, the symptoms of network interruption.
Because this attack is to use ARP Request message "deceive", so the firewall will be mistaken for the normal request packet, do not intercept. So it's hard for ordinary firewalls to withstand this attack.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.