Preview

MITM ARP Poisoning Case Study

Good Essays
Open Document
Open Document
2570 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
MITM ARP Poisoning Case Study
CmpE 209 Zachary Baumgartner
Professor Park 4/6/15
Homework #2

[Question 1] MITM ARP Poisoning
1. If node1 is a "man in the middle" then node4 is an "odd man out." In particular, node4 was unaccounted for in section 2 "Recording actual address mappings." Later you arp poisoned node2 and node0 from node1; how about arp poisoning node 4 from node1? You accomplish poisoning by sending a crafted arp message to a node. Comment on the ways and means of poisoning node4 from node1. o The key to this question is that ARP is a layer 2 protocol. Since it is a layer 2 protocol, it can route to anything within the same network. In this case, only the hosts are in the same network, so we can only ARP poison the hosts. Node4 is subnetted,
…show more content…
o The content is static and therefore does not change depending on who or when requests the content, making a replay attack effective since the content shouldn’t be expected to change.
3. Insertion Tasks
• Given the power of etterfilter and the kinds of traffic on this network, you can actually make significant changes to a machine or machines that you're not even logged in to. How? o Etterfilter compiles source filter files into binary filter files for ettercap to use. Ettercap can then do an ARP spoof on two targets. Now that a MITM attack is being performed, network traffic can be altered, which will then make changes to the victim machines without being logged into.
• Of the cleartext protocols in use, can you perform any other dirty tricks using insertion attacks? The more nasty and clever they are, the better. o One dirty type of insertion attack is tricking a client into believing that the server it’s connecting to has a valid signed certificate. Using a vulnerable protocol such as telnet, a malicious user can insert the illegitimate certificate and possibly redirect the client to an illegitimate website.
4. MITM Tasks
• What configuration elements did you have to
…show more content…
Use the DETER Visualization tab to show the network and use arp and ifconfig commands to detect MAC and IP addresses for each machine. • State the source MAC and IP addresses as well as destination MAC and IP addresses for a packet going from the client to the cache
a. Source – client
i. IP Address: 10.1.1.2 ii. MAC Address: 00:04:23:AE:CE:B2
b. Destination – cache
i. IP Address: 10.1.1.3 ii. MAC Address: 00:04:23:AE:CE:CB
• Does the packet travel through the attacker box?
a. No
• State the source MAC and IP addresses as well as destination MAC and IP addresses for a packet going from the cache to the authoritative server
a. Source – cache
i. IP Address: 10.1.2.2 ii. MAC Address: 00:04:23:AE:CE:CA
b. Destination – cache
i. IP Address: 10.1.2.3 ii. MAC Address: 00:04:23:AE:CE:68
• Does the packet travel through the attacker box?
a. No
3. Part 3: Using Ettercap
Login to the attacker machine. Using ettercap, your objective is to get the DNS query for www.google.com to pass through the attacker. Once you've accomplished this and confirmed that the desired traffic is now passing through the attacker, record the following:
1. The command you

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The neighbor nodes forward the Route Request (RREQ) to the destination node. If Rushing attacks send duplicate Route Request (RREQ) to the neighbor node. If Request RREQ is from the true source address, then the system is regular and begins to transmit data packets otherwise repeat the process. This process is illustrated in Fig 1.…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    What is the MAC (physical) address of the host requesting the MAC address of the default gateway (router)?…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IP address of the SYN packet correspond to any of the IP addresses provided in…

    • 671 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In the Screenshot above, cdn2 has a different IP (54.230.2.234) in one case and cdn0 also has a different IP (54.230.3.190) for three different objects. o Now, because we parse har file w.r.t host name and pcap w.r.t IP, all three of cdn0, cdn2, cdn3 have same TCP connections in the table as they have same IPs. o Better way to read this would be to consider only non-zero download size connections for each of these three domains. Haven’t implemented it to avoid irregularity in the table.…

    • 2486 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    802.3 is the IEEE working group and it provides standards and recommendations in architecture and internetworking in LANs and MANs…

    • 545 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 3 Quiz

    • 1152 Words
    • 5 Pages

    192.168.0.1 is the next-hop address that is used by R2 to route a packet from the 172.16.0.0 network to the 192.168.12.0network…

    • 1152 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    LAB8.1.1) Network ID is 110| Host id is 10.10.1|Network ID binary is 01101110 Host ID is 00001010.00001010.00000001…

    • 367 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    6. IP packet is sent to forwarding host by addressing it to the resolved MAC address.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2640 Final Review

    • 1061 Words
    • 5 Pages

    12. What summary route includes the subnets 99.1.1.0, 99.1.2.0, and 99.1.3.0, mask 255.255.255.0 but does not include more prefixes than necessary?…

    • 1061 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Identify the three IP address classes, the default subnet mask used with each, and the number of hosts for each.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    netw 240 week 7

    • 330 Words
    • 3 Pages

    What is the MAC (Physical) address of the Host requesting the MAC address of the default gateway (router)?…

    • 330 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    Provide a short summary (including the name) and details of the contribution that each of the following organizations have played in facilitating effective data communication. Summarize the types of standards that would be found at each organization and map those to the layered model used by Kurose Ross.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    IS3445 Unit 4 Lab

    • 556 Words
    • 2 Pages

    2. Explain a scenario where a hacker may use Cross Site Request Forgery (CRFS) to perform authorized transactions.…

    • 556 Words
    • 2 Pages
    Good Essays
  • Good Essays

    paper

    • 362 Words
    • 2 Pages

    3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when…

    • 362 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    • An unauthorized user eavesdrops on remote access communications and manipulate them using a compromised server (Scarfone, Hoffman, & Souppaya, 2009)…

    • 505 Words
    • 3 Pages
    Good Essays