Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Graphical representation of a network during an ARP-Spoofing Attack


  • Please log in to reply
1 reply to this topic

#1 Phuesick

Phuesick

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:01:12 PM

Posted 01 March 2017 - 03:01 PM

Hey Community  :hug: ,

 

I wanted to graphically display a network during an ARP-Poisoning attack. So I created:

https://www.docdroid.net/j1WY76H/arp-spoofing.pptx.html

 

I would like to know if I made any mistakes or / and misunderstood something.

 

 

Thanks in advance! :)

Greetings from Germany :bananas:  


Edited by Phuesick, 01 March 2017 - 03:02 PM.


BC AdBot (Login to Remove)

 


#2 Didier Stevens

Didier Stevens

  • BC Advisor
  • 2,638 posts
  • OFFLINE
  •  
  • Gender:Male
  • Local time:02:12 PM

Posted 02 March 2017 - 04:58 AM

The presence of the switch makes it harder to understand: sometimes you draw your connections going through the switch, and sometimes not.

While in reality all packets go through the switch.

 

You also connect your mobile phone and laptop directly to the switch. While they are probably using WiFi and thus not connecting to the switch directly.


Didier Stevens
http://blog.DidierStevens.com
http://DidierStevensLabs.com

SANS ISC Handler
Microsoft MVP 2011-2016 Consumer Security, Windows Insider MVP 2016-2018
MVP_Horizontal_BlueOnly.png

 

If you send me messages, per Bleeping Computer's Forum policy, I will not engage in a conversation, but try to answer your question in the relevant forum post. If you don't want this, don't send me messages.

 

Stevens' law: "As an online security discussion grows longer, the probability of a reference to BadUSB approaches 1.0"





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users