Documente Academic
Documente Profesional
Documente Cultură
man-in-the-middle attacks in a
local area network environment
Faheem Fayyaz and Hamza Rasheed
JULY/AUGUST 2012
35
MAC Address
00:14:c2:c9:6b:e5
Network Prefix
192.168.1.0
Calculate Seed
c+9+6+b+e+5
57
First Generation
57 XOR 9 =
48
Second Generation
48 XOR b =
59
MAC Address
00:14:c2:c9:6b:e5
Assigned IP
192.168.1.62
Third Generation
59 XOR 5 =
62
A tt a c k e r s c a n e a s i l y
perform MITM attacks by
exploiting the vulnerability present in ARP.
ARP poisoning can be
performed by any novice
or script kiddy attacker as
it only requires access to
open source tools.
Third Generation = 62
First Generation
59 XOR b =
48
No Poisoning
Sum = Seed
Sum =
c+9+6+b+e+5 =
57
36
Second Generation
62 XOR 5 =
59
Seed
48 XOR 9 =
57
JULY/AUGUST 2012
Conclusion
By using the right tools, an MITM
attack is possible, as ARP and other
secure protocols have some vulnerability. The proposed solution is much better
than the existing tools and techniques as
it does not change ARP
there are no hardware requirements
there is no cryptography
there is no computational cost.
The proposed solution not only detects
the ARP poisoning-based MITM attacks
but also prevents them. This methodology
does not slow down the network traffic
and very easy to implement.
37