150 likes | 551 Views
Chapter 3. Spoofing (3.1 ARP Spoofing). Hoon Ko hoon.ko@ujep.cz Office# 460, Department of Informatics, J. E. Purkinje University. MAC Table. MAC table set: to protect attacks from IP conflict or spoofings. Install before test. Libnet Libpcap DB (Berkeley Database
E N D
Chapter 3. Spoofing(3.1 ARP Spoofing) Hoon Ko hoon.ko@ujep.cz Office# 460, Department of Informatics, J. E. Purkinje University
MAC Table • MAC table set: to protect attacks from IP conflict or spoofings
Install before test • Libnet • Libpcap • DB (Berkeley Database • Libnidis (Library Network IDS) • OpenSSL
Libnet Root# ./configure Root# make Root# make test Root# make install
Libcap Root# ./configure Root# make Root# make install
DB (Berkeley Database) Root# cd build_unix Root# ../dist/confiugure --enable-compat185 Root# make Root# make install
Libnidis (Library Network IDS) Root# ./configure Root# make Root# make install
OpenSSL Root# ./config Root# make Root# make test Root# make install
ARP Spoofing • ARP: to know from IP address to MAC address • RARP: to know from MAC address to IP address
ARP spoofing tool (fake-1.1.2.rpm) Root# rpm -Uvh fake-1.1.2-1.i386.rpm • Packet reply tool (Fragrouter 1.6) Root# ./configure Root# make
ARP table before attacking • Relay function run before attacking • ARP Spoofing attack start
ARP table after attacking • Fragrouter that it still is attacking
TCPdump / windump check • Catch ‘ls’ typing of client
How to protect? • Set the static MAC table • ex) arp –s IP address MAC address