Emerging Technologies for Digital Infrastructure Development

Author(s): Soon Qi Huan and Vinesha Selvarajah * .

DOI: 10.2174/9789815080957123010013

ARP Spoofing in Launching Man-in-the-Middle Attack

Pp: 127-140 (14)

Buy Chapters
  • * (Excluding Mailing and Handling)

Emerging Technologies for Digital Infrastructure Development

ARP Spoofing in Launching Man-in-the-Middle Attack

Author(s): Soon Qi Huan and Vinesha Selvarajah * .

Pp: 127-140 (14)

DOI: 10.2174/9789815080957123010013

* (Excluding Mailing and Handling)

Abstract

Man-in-the-Middle (MITM) attack is a typical eavesdropping cyberattack. The attacker can launch a MITM attack whenever the attacker and victims are on the same network. Here is a scenario: A MITM attacker connects to Subway’s Wi-Fi and waits for the victim to connect to the Subway Wi-Fi. Eventually, Victim A walks in and connects to Subway’s Wi-Fi. Once Victim A gets connected and is on the same network as the attacker, the attacker can launch an attack to intercept the network traffic of Victim A. Therefore, everyone on the same network connection with the attacker can be the target of a MITM attack. In this paper, the MITM attack will be introduced. The attacker can spy on the victim, steal sensitive credentials, disrupt communications, or even corrupt the data through the said attack. To discover how the MITM attack works, this paper explains it based on the ARP Spoofing attack, which exploits the ARP protocol to send out forged ARP responses. ARP Spoofing attack is one of the MITM attacks. This paper emphasises the MITM attack phases, different types of MITM attacks, ARP Spoofing attacks, and how ARP works. The demonstration of steps for launching an ARP Spoofing attack and the tools involved, like Nmap, Arpspoof, and Wireshark, are also included.