ARP Flood Attack Explained

2025-06-16 Visits:

How easily can your network be compromised? ARP Flood Attack Revealed!

Good evening, my friends!

Let's do an experiment today called the ARP flood attack experiment, This experiment will cause a bandwidth drain on our network, and if it's a gateway-targeted attack, the ARP table settings on the gateway will overflow, leading to a significant drain on the device's performance. This does sound quite alarming, so let's go ahead and perform the experiment.

 

For more information, please scan the WhatsApp QR code below to contact customer service.

 

图片.png 

 

01 An Introduction to ARP Flooding Attacks

ARP Address Resolution ProtocolAddress Resolution Protocol ARP is a protocol that resolves the IP address to the corresponding MAC address. The ARP protocol has the advantage of being simple and easy to use, but because it has no security mechanism, it is easy to be used by attackers.

In the network , the common ARP attack methods include ARP spoofing attack and ARP flooding attack .

This article mainly explains ARP flooding attacks and how ARP flooding attacks are implemented.

ARP flooding attack: ARP flooding attack is a denial of service attackAttackers send a large number of forged ARP request packets or free packets to the device whose destination IP addresses cannot be resolved, causing the ARP table entries on the device to overflow and unable to cache the ARP table entries of normal users, thus affecting the normal packet forwarding.

图片.png 

For example, in this image, the attacker intentionally sends a large number of useless ARP packets, and the entire broadcast domain is attacked, including PC1, PC2 and the gateway.

 

02 ARP Flooding Attack Experiment

Install a software called Core packet generator.

Then open Core packet generator as an administrator

图片.png 

Add ARP digital packet

图片.png 

After adding, yes, we still need to do the content of the data packet.

图片.png 

We bridge a network card and connect it to the ENSP emulator.

图片.png 

We need to know what an ARP packet really looks like.

图片.png 

In a network, a network segment communicates between pieces of the network. For example, PC1 configured at 192.168.109.10 accesses PC2 at 192.168.19.20. Because PC1 does not initially have an ARP mapping table, it sends an ARP request to the broadcast domain.

The composition of the newspaper is shown here:

图片.png 

In the frame format, we are the source MAC is PC1 MAC address; Objective MAC is all F, ff: ff: ff: ff: ff: ff.

The content of the digital packet of the ARP is that the source MAC is the MAC address of the PC1; The source IP is the PC1 IP address 192.168.109.10; Objective MAC is all F, ff: ff: ff: ff: ff: ff; The destination address is PC2's IP address 192.168.109.20.

The learning of ARP table has nothing to do with the MAC address in the two-layer header, and records table entries based on the IP and MAC addresses in the ARP packet.

The above is the basic content of an ARP digital packet, after understanding the content of digital packet, we will construct the ARP digital packet.

图片.png 

There is no ARP flood attack in an ARP packet , so let 's have a few more . It can be added or clicked to copy

图片.png 

Then Paste

图片.png 

Only change the part that can record ARP table entries

图片.png 

Likewise, we replicate many times, first completing ten, then clicking on the network card

Select the network card corresponding to the cloud set in ensp

图片.png 

Then click to send all

图片.png 

图片.png 

Then we are in the PC in ensp, can look at the arp map table

PC>arp -a

Internet Address

Physical Address

Type

192.168.109.20

54-89-98-1C-4F-E2

dynamic

192.168.109.30

11-11-11-11-11-11

dynamic

192.168.109.40

11-11-11-11-11-22

dynamic

192.168.109.60

11-11-11-11-11-44

dynamic

192.168.109.50

11-11-11-11-11-33

dynamic

192.168.109.70

11-11-11-11-11-55

dynamic

192.168.109.90

11-11-11-11-11-77

dynamic

192.168.109.80

11-11-11-11-11-66

dynamic

192.168.109.110

11-11-11-11-11-77

dynamic

192.168.109.100

11-11-11-11-11-88

dynamic

192.168.109.120

11-11-11-11-11-98

dynamic

 

Because the request packet of ARP is a broadcast packet, the entire broadcast domain will be subject to ten useless ARP packets, including the gateway, and then count the ARP table entries, resulting in a waste of resources, so as long as enough is constructed, the resources of the ARP Table entries can be exhausted.

 

For more ARresources, follow the Facebook account & youtube account: Thinkmo Dumps


Leave Your Message