Penetration Testing mailing list archives

Re: Stopping Arp poison attacks


From: Dan Catalin Vasile <hardware_cta () yahoo com>
Date: Sun, 4 Jun 2006 22:05:34 -0700 (PDT)

Hi Peter,
The best thing you can recommend by far to your client
is using static arp tables. If the data is very
sensitive that's the best you can do to protect from
arp poisoning. Even in large networks a procedure can
be implemented to keep the arp tabels up to date.
Also, another method to protect data against this
attack (partially) is to use encryption for all data,
not only the logins. Why not only the login? Because
usualy MITM attacks takes place after the login. And
because sensitive data like e-mails travel unencrypted
after the initial login.

Have secure phun,
Dan

--- "P. Entester" <pentest__ () hotmail com> wrote:


Hello there,

I am not a networking expert, but in my work as a
pentester i often use arp 
poison attacks to intercept interesting traffic.
If i recommend our customers to bind the MAC
addresses of mission critical 
servers' network interfaces to their respective
ports on the routers and 
switches, does that migitate most of the threat or
am i missing something 
important?

Thanks in advance for your reply.

Peter.


_________________________________________________________________
Express yourself instantly with MSN Messenger!
Download today - it's FREE! 

http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/



------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only
one to win the Analyst's 
Choice Award from eWeek. As attacks through web
applications continue to rise, 
you need to proactively protect your applications
from hackers. Cenzic has the 
most comprehensive solutions to meet your
application security penetration 
testing and vulnerability management needs. You have
an option to go with a 
managed service (Cenzic ClickToSecure) or an
enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how
a managed service can 
help you:
http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit
for you to confirm your 
results from other product. Contact us at
request () cenzic com for details.

------------------------------------------------------------------------------




__________________________________________________
Do You Yahoo!?
Tired of spam?  Yahoo! Mail has the best spam protection around 
http://mail.yahoo.com 

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: