a. Why do hosts use ARP? b. Can ARP poisoning be used outside the LAN? Why not? c. Why do hosts send ARP requests? d. What is ARP spoofing? e. How could an attacker use ARP spoofing to manipulate host ARP tables?
a. Explain ARP poisoning? b. Why does the attacker have to send a continuous stream of unrequested ARP replies? c. Do switches record IP addresses? Why not? d. Does the attacker have to poison the gateway’s ARP tables too? Why? e. Why does all network traffic go through the attacker after poisoning the network?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here