Talk With an Expert

Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks

Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks (PDF, 1.70MB)Published: 27 Sep, 2001
Created by
Robert Wagner

The classic Man-in-the-Middle attack relies upon convincing two hosts that the computer in the middle is the other host. This can be accomplished with a domain name spoof if the system is using DNS to identify the other host or address resolution protocol (ARP) spoofing on the LAN. This paper is designed to introduce and explain ARP spoofing. The term Man-in-the-Middle is used from a historical usage, this does not imply that only men can use these attacks. Perhaps Teenager-in-the-Middle or Monkey-in-the-Middle may be more accurate terms.

Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks