Health.Zone Web Search

Search results

  1. Results from the Health.Zone Content Network
  2. ARP spoofing - Wikipedia

    en.wikipedia.org/wiki/ARP_spoofing

    In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host, such as the default gateway, causing any ...

  3. ARP cache - Wikipedia

    en.wikipedia.org/wiki/ARP_cache

    An ARP cache[1] is a collection of Address Resolution Protocol entries (mostly dynamic), that are created when an IP address is resolved to a MAC address (so the computer can effectively communicate with the IP address). [2] An ARP cache has the disadvantage of potentially being used by hackers and cyberattackers (an ARP cache poisoning attack).

  4. Address Resolution Protocol - Wikipedia

    en.wikipedia.org/wiki/Address_Resolution_Protocol

    The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as a MAC address, associated with a given internet layer address, typically an IPv4 address. This mapping is a critical function in the Internet protocol suite.

  5. Cache poisoning - Wikipedia

    en.wikipedia.org/wiki/Cache_poisoning

    Cache poisoning refers to a computer security vulnerability where invalid entries can be placed into a cache, which are then assumed to be valid when later used. [1] Two common varieties are DNS cache poisoning [2] and ARP cache poisoning. Web cache poisoning involves the poisoning of web caches [3] (which has led to security issues in ...

  6. Neighbor Discovery Protocol - Wikipedia

    en.wikipedia.org/wiki/Neighbor_Discovery_Protocol

    The Neighbor Discovery Protocol (NDP), or simply Neighbor Discovery (ND), is a protocol of the Internet protocol suite used with Internet Protocol Version 6 (IPv6). [1] It operates at the internet layer of the Internet model, [2] [3] and is responsible for gathering various information required for network communication, including the configuration of local connections and the domain name ...

  7. IP address spoofing - Wikipedia

    en.wikipedia.org/wiki/IP_address_spoofing

    The basic protocol for sending data over the Internet network and many other computer networks is the Internet Protocol (IP). The protocol specifies that each IP packet must have a header which contains (among other things) the IP address of the sender of the packet. The source IP address is normally the address that the packet was sent from ...

  8. MAC flooding - Wikipedia

    en.wikipedia.org/wiki/MAC_flooding

    Security features to prevent ARP spoofing or IP address spoofing in some cases may also perform additional MAC address filtering on unicast packets, however this is an implementation-dependent side-effect. Additional security measures are sometimes applied along with the above to prevent normal unicast flooding for unknown MAC addresses. [5]

  9. arpwatch - Wikipedia

    en.wikipedia.org/wiki/Arpwatch

    ee.lbl.gov. arpwatch is a computer software tool for monitoring Address Resolution Protocol traffic on a computer network. [1] It generates a log of observed pairing of IP addresses with MAC addresses along with a timestamp when the pairing appeared on the network. It also has the option of sending an email to an administrator when a pairing ...