Network Attacks, Architecture and Isolation
Network Attacks, Architecture and Isolation
ATTACKS,
ARCHITECTURE
AND ISOLATION
NETWORK ATTACKS,
ARCHITECTURE AND ISOLATION
NETWORK ATTACK
• The device with the correct IP replies with the correct MAC
Address.
• This is then added to the ARP Table Cache with tools like:
ARP Spoof,Ettercap which are available in Linux and Cain &
Able available in Windows.
MITM(Man In The Middle) Attacks
• An attacker fools all the devices in the network on believing that
the attacker is the default gateway or the router by abusing the
address resolution protocol (ARP)
• · The attacker can then observe, record ,inject and manipulate
traffic.
• https://www.youtube.com/watch?v=_koXhJ8fXmw
THANK YOU