Question: N 2 . 1 6 . In an MITM attack, the attacker M tries to intercept the communication between A and B that are on

N2.16. In an MITM attack, the attacker M tries to intercept the communication between A and
B that are on the same LAN. Please describe what M needs to do, so it can modify the
packets from A to B.
N2.17. In the MITM attack described in the book, the attacker M uses the ARP cache poison-
ing attack to redirect the A-to-B packets to M.(1) If the IP forwarding on the attacker
machine M is turned off, what will happen to the packets? (2) If the IP forwarding on
M is turned on, what will happen to the packets? (3) If the attacker wants to modify the
packet, should the attacker turn on or off the IP forwarding.
N2.18. In the MITM attack described in the book, the attacker M uses the ARP cache poisoning
attack to redirect the A-to-B packets to M. How does the attacker get this packet?
N2.19. In the MITM attack code, the attacker tries to modify the packets from A to B. After
intercepting such a packet, the attacker makes a copy of the packet, and then does the
following. Why does the attacker have to delete the IP and TCP checksums?
newpkt =IP(bytes(pkt[IP]))
del (newpkt.chksum)
del (newpkt[TCP].chksum)
N2.21. Machines A, B, and M are on the same LAN, and their IP addresses and MAC
addresses are listed below.
A'SIP: 10*9*0.5
B'SIP: 10*9*0.6
M'sIP: 10.9*0.9
A's MAC address:
aa:bb:cc:dd:ee:05,B's MAC
address: aa:bb:cc:dd:ee:06M's
The attacker on M wants to use the ARP cache poisoning to launch the MITM (Man-
In- The-Middle) attack against A and B, i.e., intercepting the communication between
A and
B. To achieve this goal, the attacker wants to use the following program to send spoofed
ARP requests. Please complete the code.
# Constructing spoofed ARP request to Host A
ether1= Ether (dst =
arp1=ARP(op=1)
arp1.psrc -_ # An IP address
arp1.hwsrc - # An Ethernet address
arp1.pdst = # An IP address
sendp(
# Constructing spoofed ARP request to Host B
ether2= Ether (dst =
arp2=ARP(op=1)
 N2.16. In an MITM attack, the attacker M tries to intercept

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!