


Note: From the network security professionals view, it becomes absolutely necessary to monitor ARP traffic continuously and limit it to below a threshold. Thus, not securing an ARP cache is dangerous to network security. Further, the device will remember this MAC address only as long as you keep telling the device about it. So let us interpret this quote by a leader of the infamous Nazi regime from the perspective of the ARP protocol: If you repeatedly tell a device who a particular MAC address belongs to, the device will eventually believe you, even if this is not true. It thus becomes vitally important for the state to use all of its powers to repress dissent, for the truth is the mortal enemy of the lie, and thus by extension, the truth is the greatest enemy of the state. The lie can be maintained only for such time as the state can shield the people from the political, economic and/or military consequences of the lie. Joseph Goebbels, Nazi Germanys minister for propaganda, famously said, If you tell a lie big enough and keep repeating it, people will eventually come to believe it. In this article, we will limit our discussions to MITM attacks that use ARP spoofing. Active attacks: These modify the traffic and can be used for various types of attacks such as replay, spoofing, etc.Īn MITM attack can be launched against cryptographic systems, networks, etc. Passive attacks (also called eavesdropping or only listening to the traffic): These can reveal sensitive information such as clear text (unencrypted) login IDs and passwords.Ģ.
