01-02-2012
There is only one router in that network, so all arp traffic is passing through it and it can be monitored and filtered.
Yes, the attacker must be on my local network, that's the idea. Arp spoofing is common on public hotspots, university networks etc.
But you are right, dropping all trafic is not a good solution.
Do you propose another protection?
7 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
There is a program that I am trying to run on a shell account. It depends on another program, which I have also copied to the shell account. Both are in my home directory, yet the first program has a different path hardcoded into it, which I cannot use because of permissions problems.
How can I... (3 Replies)
Discussion started by: fahadsadah
3 Replies
2. UNIX for Dummies Questions & Answers
Hi, I am currently using Mailx to send a mail message from my unix account via an SMTP relay. This is working ok.
However from the recipient end the FROM address they see on mails received is <unix account>@<domain> eg prod@liveserver.com
Is there anyway I can spoof this FROM address from the... (1 Reply)
Discussion started by: jimthompson
1 Replies
3. Cybersecurity
Hello all, i need your quick help. I have assignment project class to make a program using pcap library to spoofing DNS in linux environment. Can anyone help me, because i'm newbie in network security and in C?:confused:
Regards,
ptrfw (1 Reply)
Discussion started by: riska_bali
1 Replies
4. Cybersecurity
There is a question in the SCO section asking for information on how to change the MAC address of a NIC. Is there a valid reason for wanting to change the MAC address? (1 Reply)
Discussion started by: jgt
1 Replies
5. Solaris
Hi everybody!
I'm facing a problem and I doubt about the solution (I'm not very familiar with old *NIXs).
An external network supplier (let's call them "telco") just installed new communication components that filters MAC addresses.
I have a Solaris 5 server, with 1 NIC (hte0) which is... (6 Replies)
Discussion started by: Isharfoxat
6 Replies
6. OS X (Apple)
I tried to use the command
sudo ifconfig en0 ether xx:xx:xx:xx:xx:xx
to do mac spoofing for internet connection in my office. It works only for 5 minutes. Every time after about 5mins, the Internet will be disconnected. :wall:
Any one knows how to solve this problem? Thanks. (6 Replies)
Discussion started by: andrewust
6 Replies
7. UNIX for Dummies Questions & Answers
I have a machine (IP:192.168.1.185) and i want to send spoofed IP address (e.g. 192.168.1.212) to another machine(192.168.1.213) . I am using a spoofing program for this which uses raw sockets.
Now whenever i pass the parameters(spoofed ip addr and destination) to the output of the program, i... (2 Replies)
Discussion started by: syncmaster
2 Replies
NETWORKS(5) File Formats Manual NETWORKS(5)
NAME
networks - network name data base
DESCRIPTION
The networks file contains information regarding the known networks which comprise the DARPA Internet. For each network a single line
should be present with the following information:
official network name
network number
aliases
Items are separated by any number of blanks and/or tab characters. A ``#'' indicates the beginning of a comment; characters up to the end
of the line are not interpreted by routines which search the file. This file is normally created from the official network data base main-
tained at the Network Information Control Center (NIC), though local changes may be required to bring it up to date regarding unofficial
aliases and/or unknown networks.
Network number may be specified in the conventional ``.'' notation using the inet_network() routine from the Internet address manipulation
library, inet(3N). Network names may contain any printable character other than a field delimiter, newline, or comment character.
FILES
/etc/networks
SEE ALSO
getnetent(3N)
BUGS
A name server should be used instead of a static file.
4.2 Berkeley Distribution May 6, 1986 NETWORKS(5)