Re: Stopping Arp poison attacks

From: Dan Catalin Vasile (hardware_cta@yahoo.com)
Date: Mon Jun 05 2006 - 01:05:34 EDT


Hi Peter,
The best thing you can recommend by far to your client
is using static arp tables. If the data is very
sensitive that's the best you can do to protect from
arp poisoning. Even in large networks a procedure can
be implemented to keep the arp tabels up to date.
Also, another method to protect data against this
attack (partially) is to use encryption for all data,
not only the logins. Why not only the login? Because
usualy MITM attacks takes place after the login. And
because sensitive data like e-mails travel unencrypted
after the initial login.

Have secure phun,
Dan

--- "P. Entester" <pentest__@hotmail.com> wrote:

>
> Hello there,
>
> I am not a networking expert, but in my work as a
> pentester i often use arp
> poison attacks to intercept interesting traffic.
> If i recommend our customers to bind the MAC
> addresses of mission critical
> servers' network interfaces to their respective
> ports on the routers and
> switches, does that migitate most of the threat or
> am i missing something
> important?
>
> Thanks in advance for your reply.
>
> Peter.
>
>
_________________________________________________________________
> Express yourself instantly with MSN Messenger!
> Download today - it's FREE!
>
http://messenger.msn.click-url.com/go/onm00200471ave/direct/01/
>
>
>
------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only
> one to win the Analyst's
> Choice Award from eWeek. As attacks through web
> applications continue to rise,
> you need to proactively protect your applications
> from hackers. Cenzic has the
> most comprehensive solutions to meet your
> application security penetration
> testing and vulnerability management needs. You have
> an option to go with a
> managed service (Cenzic ClickToSecure) or an
> enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how
> a managed service can
> help you:
> http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit
> for you to confirm your
> results from other product. Contact us at
> request@cenzic.com for details.
>
------------------------------------------------------------------------------
>
>

__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:02 EDT