When ARP Goes Wrong: Threat Hunting ARP Poisoning in Network Traffic
嗯,用户让我总结一篇文章,控制在一百个字以内,而且不需要特定的开头。我得先通读一下文章内容。 文章主要讲的是ARP协议的基本原理,包括IP地址和MAC地址的转换过程。然后详细解释了ARP请求和响应的工作机制,还提到了如何使用Wireshark和tshark来检测ARP中毒攻击。 接下来,用户要求总结在100字以内,所以我要抓住关键点:ARP的作用、攻击方式、检测工具和防御措施。同时要确保语言简洁明了。 最后,组织一下语言,确保信息全面且符合字数限制。 </think> 文章介绍了ARP协议的基本原理及其在网络通信中的作用,通过分析ARP请求和响应的工作机制,揭示了如何通过异常行为检测ARP中毒攻击,并展示了使用Wireshark和tshark工具识别异常IP-MAC映射的方法,强调了持续监控和网络保护的重要性。 2026-2-12 05:48:38 Author: infosecwriteups.com(查看原文) 阅读量:2 收藏

Before we start, it’s important to understand the basics of the ARP protocol.

In a local network, devices do not communicate using IP addresses alone. Actual data transmission at the network level relies on physical (MAC) addresses.
The Address Resolution Protocol (ARP) is responsible for resolving an IP address to its corresponding MAC address so that devices can communicate with each other within the same local network.

for example, when a system wants to communicate with the internet, it must first communicate with the default gateway.
Before starting this communication, the system checks its ARP cache to see whether the MAC address of the gateway is already known.
If the gateway’s MAC address is not present in the ARP cache, the system sends an ARP broadcast request to the entire local network to discover the MAC address of the corresponding device.
In this process, the destination MAC address of the broadcast frame is always set to ff:ff:ff:ff:ff:ff, ensuring that all devices on the local network receive the request.

Press enter or click to view image in full size

The Wireshark arp filter lists all ARP packets.

Focusing on ARP requests, we use the arp.opcode == 1 filter to list all ARP request packets.

Press enter or click to view image in full size

An ARP request contains the sender’s IP address and MAC address, along with the target IP address. The target MAC address is unknown at this stage and is set to all zeros, as the purpose of the ARP request is to discover it.

As the next step, we look for the ARP response.

Press enter or click to view image in full size

If nothing appears suspicious at first glance, how can we detect an ARP poisoning attack? What abnormalities should we look for in ARP packets, and how can these abnormalities be identified?

Before hunting attacks, we must know normal ARP behavior:

  • ARP requests are broadcast
  • ARP replies are unicast
  • One IP usually maps to one MAC address
  • ARP replies usually follow an ARP request
  • ARP traffic volume is low and periodic

Anything that breaks these assumptions is suspicious.

Get BlackMamba’s stories in your inbox

Join Medium for free to get updates from this writer.

Here i am using TSHRK for better understand and better view .
First, we examine ARP requests and replies using tshark, as this provides a clearer understanding of how ARP works.

In this tshark command, arp.src.proto_ipv4 represents the IP address of the sender generating the ARP packet, while arp.dst.proto_ipv4 represents the target IP address for which the MAC address is being requested or announced.

Here, we can clearly observe ARP requests and replies, which helps us understand how the ARP protocol works. Next, we focus on identifying abnormalities by filtering ARP reply packets along with their associated IP and MAC addresses.

Press enter or click to view image in full size

At this point, we are very close to identifying the issue.

As discussed earlier, a MAC address is a unique identifier, and under normal circumstances, each IP address should be associated with a unique MAC address within the same network.
However, in this case, we observe that three different IP addresses are mapped to the same MAC address (08:00:27:9b:8b:bd). This behavior is abnormal and strongly indicates the presence of ARP poisoning on the network.

From the above tshark command,
arp.src.proto_ipv4 represents the IP address claimed by the sender of an ARP packet, while arp.src.hw_mac represents the MAC address making that claim. Analyzing these fields together helps identify abnormal IP-to-MAC mappings indicative of ARP poisoning.

Another way to confirm ARP poisoning is by using Wireshark’s built-in analysis features.

Open the PCAP file in Wireshark, apply the arp display filter, and then navigate to Analyze → Expert Information.
In the Expert Information window, Wireshark may raise a “Duplicate IP address configured” warning. When this warning is expanded, it reveals that multiple IP addresses are associated with the same MAC address, which is a strong indicator of ARP spoofing or poisoning.

Press enter or click to view image in full size

In this analysis, we started by understanding normal ARP behavior and gradually moved toward identifying abnormalities within ARP packets. By examining unsolicited ARP replies and detecting multiple IP addresses mapped to a single MAC address, we were able to confirm the presence of an ARP poisoning attack.

This investigation demonstrates that ARP poisoning often blends into otherwise normal-looking network traffic and cannot be detected by looking at a single packet in isolation. Instead, recognizing patterns and inconsistencies over time is critical.

Since ARP lacks built-in authentication, it remains a viable attack vector in many environments, particularly on public or unsecured networks. For defenders, continuous monitoring of ARP traffic and enforcing network-level protections are essential steps toward mitigating these attacks.


文章来源: https://infosecwriteups.com/when-arp-goes-wrong-threat-hunting-arp-poisoning-in-network-traffic-cf9f9d9c9ee1?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh