Главная
Study mode:
on
1
Intro
2
Overview
3
ARP Message Formats
4
ARP Request Message
5
ARP Reply Message
6
Unsolicited ARP Reply
7
Types of Attack
8
Sniffing on a Hub
9
Switch Sniffing
10
Host to Host Exploit
11
Host to Router Exploit
12
Relay Configuration Attacker
13
Relay Configuration (cont.)
14
Sniffing Comments
15
Session Hijacking/MiM
16
Denial of Service
17
DOS MAC Entries Attacker
18
Web Surfing
19
Network-based IDS
20
Hostile Users
21
Switch Attacks (cont.)
22
Network "Bombs"
23
Operating Systems
24
Not Vulnerable
25
Firewalls
26
Session Encryption
27
Strong Authentication
28
Port Security (Cont.)
29
Hard Coding Addresses
30
Hard Coding Results
31
Countermeasure Summary
32
IDS Architecture Issues
33
OS Level Detection
34
Hypothetical Detection Application
35
Public Domain Tools
36
Bibliography
37
Demo Environment
Description:
Explore the vulnerabilities of Address Resolution Protocol (ARP) and their potential for indefensible local network attacks in this Black Hat USA 2001 conference talk. Delve into ARP message formats, including request and reply messages, and examine various attack types such as sniffing on hubs and switches, host-to-host exploits, and router exploits. Learn about session hijacking, man-in-the-middle attacks, and denial of service techniques. Investigate countermeasures like session encryption, strong authentication, and port security. Discuss operating system vulnerabilities, firewall considerations, and IDS architecture issues. Gain insights into OS-level detection methods and hypothetical detection applications. Review public domain tools and a comprehensive bibliography before concluding with a demonstration of the discussed concepts in a practical environment.

ARP Vulnerabilities - Indefensible Local Network Attacks

Black Hat
Add to list
0:00 / 0:00