You are here: hacking technology > firewall > Content
Hot Articles
Recommend Articles
New Articles
360ARP firewall's simple introduction
  Add date: 07/24/2008   Publishing date: 07/24/2008   Hits: 313
Total 2 pages, Current page:1, Jump to page:
 
 ARP (Address Resolution Protocol) is the Address Resolution Protocol, is one kind transforms the IP address the physical address the agreement. Has two ways from the IP address to physical address's mapping: Sheet mode and non-sheet mode. ARP mentions is specifically the network level (the IP level, is also is equal to OSI third) the address analysis for the data connection level (the MAC level, is also is equal in OSI second) the MAC address.  

  ARP principle: Some machine A must to the main engine B transmission text, inquire the local ARP buffer table, after finding B IP the address correspondence the MAC address, will carry on the data transmission. If has not found, then A broadcasts a ARP request message (to carry main engine A IP address Ia-- physical address Pa), requested that the IP address is Ib main engine B reply physical address Pb. On-line all main engines receive ARP including B to request, but only then main engine B distinguishes own IP address, therefore sends back a ARP response text to a main engine. And contains has the B MAC address, after A receives B the reply, will renew the local ARP buffer. Then the use this MAC address transmission data (attaches the MAC address by network card). Therefore, the local high speed buffer's this ARP table is the local network circulation foundation, moreover this buffer is dynamic.  

  The ARP attack is assorted the principle to have is assorted the influence?  

  Your network whether frequently broken line, whether to have the IP conflict frequently?  

  Whether you did worry the communication data receives the monitoring (for example MSN, QQ, EMAIL)?  

  Whether your server does suffer the ARP deceit frequently, is implanted the wooden horse by the hacker?  

  Whether you each kind of ARP attack software (for example network military judge, network are cut painstakingly deeply sword wielder, local area network end matter)?  

  The above each kind of question's root is the ARP deceit (the ARP attack). Before not having ARP deceives, the data flows is this: Gateway <-> this aircraft. After ARP deceit, the data flows is this: The gateway <-> aggressor (“network management”) the <-> this aircraft, between this aircraft and gateway's all communication data will flow through the aggressor (“network management”), therefore “the allow to oppressed” was unavoidable.  

  Above is the technical term, if does not understand may the simple understanding such  

  In the local area network, a ARP wooden horse's computer, own camouflaged the router, tells all computers “me is router everybody comes”, the result everybody's computer believed him, he has been possible optional has re-equipped the network data to give all computers, might insert in this data can rob the number the procedure.  

  The ARP attack is wants to rob my number to want to give in me the wooden horse to want to send the advertisement to me, why can always fall the cotton suiting?  

 
Other pages: : 1 * 2 * Next>>
Prev:Thorough analysis firewall diary record Next:Understands the source Linux firewall generator

Comment:

Category: Home > firewall