Contributed by Akash Shrivastava
Any computer which is connected to the Network (LAN or WAN) has two addresses. One is the IP Address (An IP Address is a 32-bit number included of a host number and a network prefix, both of which are used to uniquely identify each node within a network), and the second is Physical or Ethernet Address called MAC Address (An Ethernet address or MAC Address is a 48-bit six-part hexadecimal number in which a colon separates each part, for example, 8:0:20:1:2f:0. This number identifies the Ethernet board installed in a PC and is used to identify the PC as a member of the network).
The foremost intention of present study is to understand and deal with the subject of ARP Spoofing.
The issue that how ARP spoofing can be used for different kind of attacks to Network Structure and Operating Systems and how to provide countermeasures to protect them has been reviewed and discussed in this article.
Breaking out of Prison is easier than you think
Understanding Phishing and Protecting the 8th Layer
The Journey from Unmanaged to a Managed Risk Management Program
Responsibilities and Considerations in Secrets Management