After several support calls complaining about network issues you capture the following series of packets:
06:02:50.626330 arp reply 192.168.99.35 is-at 0:80:c8:f8:4a:51 (0:80:c8:f8:4a:51)
06:02:51.622727 arp reply 192.168.99.35 is-at 0:80:c8:f8:4a:51 (0:80:c8:f8:4a:51)
06:02:52.620954 arp reply 192.168.99.35 is-at 0:80:c8:f8:4a:51 (0:80:c8:f8:4a:51)
What type of attack is occurring?
A. man-in-the-middle
B. VLAN hopping
C. SYN flood
D. smurf
A
Explanation: The packets displayed are gratuitous arp replies. These are created by the hacker and are replies to a question that never came from the devices in the network. It causes the devices to update their arp cache with the mappings included in the packet. This creates incorrect mappings in the devices arp cache, and when done correctly can cause the hacker to receive all traffic between two machines, or make him the man-in-the-middle in a man-in-the-middle attack.
You might also like to view...
The list of commands related to an object that appear when you right-click is the ________
A) Live Preview B) shortcut menu C) Quick Access toolbar D) Mini toolbar
If you have direct knowledge of child exploitation, you should
A) Notify your local police B) Notify the FBI C) Notify the National Center for Exploited and Missing Children D) All these answers are true.