Wireless Security
arp cache poisoning on a wifi network Jul 16 2008 10:51PM
Robin Wood (dninja gmail com) (4 replies)
Re: arp cache poisoning on a wifi network Jul 17 2008 12:11PM
Elton Ramos Carvalho (elton locknet com br) (1 replies)
Re: arp cache poisoning on a wifi network Jul 17 2008 01:34PM
Cedric Blancher (blancher cartel-securite fr) (1 replies)
Re: arp cache poisoning on a wifi network Jul 17 2008 04:14PM
Robin Wood (dninja gmail com)
Re: arp cache poisoning on a wifi network Jul 17 2008 05:32AM
Cedric Blancher (blancher cartel-securite fr)
Le mercredi 16 juillet 2008 à 23:51 +0100, Robin Wood a écrit :
> On the attacker machine I've used the command:
> arpspoof -i ath0 -t 192.168.0.55 192.168.0.100
> but get the response
> "arpspoof: couldn't arp for the host 192.168.0.55"

For me, it fails regularly with the same error. Population your ARP
cache helps using arp -s for the missing entry, here 192.168.0.55.

That's why I don't use arpspoof anymore. I use arp-sk[1] whenever I can,
but sadly, it is not included in BackTrack. You can fully craft your ARP
packet, and especially send ARP requests that are more efficient for
cache poisoning.
You can also use Nemesis[2] or Scapy[3]. There are so many tools
around ;)

[1] http://sid.rstack.org/arp-sk/
[2] http://nemesis.sourceforge.net/
[3] http://www.secdev.org/projects/scapy/

--
http://sid.rstack.org/
PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE
>> Hi! I'm your friendly neighbourhood signature virus.
>> Copy me to your signature file and help me spread!

[ reply ]
Re: arp cache poisoning on a wifi network Jul 17 2008 01:45AM
Raul Siles (raul siles gmail com)
RE: arp cache poisoning on a wifi network Jul 16 2008 06:08AM
Sergio Castro (sergio castro unicin net)


 

Privacy Statement
Copyright 2010, SecurityFocus