9.3.3 - Poison ARP

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

These flashcards cover key concepts, terms, and processes related to man in the middle attacks, especially using Ettercap and ARP poisoning.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Man in the Middle Attack

A type of cyber attack where the hacker positions themselves between a victim and a target machine to intercept, manipulate, or inject traffic.

2
New cards

ARP Poisoning

A technique used in man in the middle attacks to send fake ARP messages on a local network, associating the attacker's MAC address with the IP address of the legitimate device.

3
New cards

Ettercap

A network security tool used for man-in-the-middle attacks on LAN; it can capture and inject data into network traffic.

4
New cards

HTTP vs HTTPS

HTTP is a protocol for transferring data over the internet, while HTTPS is its secure version, using SSL/TLS to encrypt the data between client and server.

5
New cards

Traffic Interception

The act of capturing and reading data being transmitted over a network.

6
New cards

Credential Capture

The process of recording a user's credentials, such as usernames and passwords, typically without their consent for malicious purposes.

7
New cards

Unified Sniffing

A mode in Ettercap that allows you to capture all traffic on a network, ensuring you see communications between the victim and other devices.

8
New cards

Victim Machine

The target device in a man in the middle attack that the attacker aims to capture information from.

9
New cards

Nmap

A network scanning tool that can discover hosts and services on a computer network by sending packets and analyzing the responses.

10
New cards

Sniffing and Spoofing

Techniques used in network attacks; sniffing refers to capturing packets of data, while spoofing involves impersonating another device on the network.