How it typically works?
- Forging ARP replies: the attacker sends falsified ARP messages associating their MAC address with a target IP (such as the default gateway).
- Traffic redirection: devices update their ARP cache and unknowingly send packets to the attacker.
- Interception or manipulation: the attacker inspects, modifies, or blocks the traffic.
Common techniques & variants
- Gratuitous ARP spoofing: attacker repeatedly sends fake ARP replies to maintain control of ARP cache.
- Gateway impersonation: attacker poisons ARP tables to impersonate the network gateway.
- Combined attacks: ARP poisoning used with DNS spoofing or MITM attacks for deeper compromise.
Impact
ARP poisoning can lead to credential theft, session hijacking, denial of service, or malware injection. Because ARP lacks authentication, local networks are inherently vulnerable if no protections are in place.
Further reading
- OWASP: ARP Cache Poisoning. Read more
- GeeksforGeeks: ARP Spoofing. Read more
- Imperva: ARP Spoofing. Read more