What is the role of ARP poisoning when doing a DHCP spoofing attack

My Current Background on the topic

DHCP Spoofing is done by a rogue DHCP server on the network which replies to DHCP requests from hosts(Attacker can run a DHCP starvation attack on the legitimate DHCP server to stop it from handing away IP addresses).
The rogue server can spoof the gateway & DNS servers therefor all DNS & Traffic going away from local subnet will start to flow to the attacker. The attacker then forward the received traffic accordingly so the hosts won’t notice any disruption in connectivity and effectively pulling off a MITM attack.

In ARP Poisoning, attacker send spoofed arp messages to the network and arp cache of the switch will have wrong information so the switch starts to send traffic to the attacker (which should originally go to another host or default gateway)

DHCPDISCOVER, DHCPOFFER, DHCPREQUEST & DHCPACK are broadcast messages so typically all hosts in the local subnet will receive all this messages anyway. Even if the attacker has already done some ARP poisoning on the local subnet it won’t affect the process of DHCP.

ARP is used for resolving Internet layer addresses into link layer addresses.Since ahost does not have an IP address until DHCP process is completed ARP attacks seems useless on DHCP

My Question
As per my understanding These two attacks are two different ways that can be used to achieve same results. But I need to clarify this without any doubt.

Is there any way you can pull off a DHCP Spoofing attack by using ARP poisoning?

Continue reading What is the role of ARP poisoning when doing a DHCP spoofing attack

Is it possible to Spoof Another Machine’s MAC Address on LAN?

Is it possible to Spoof Another Machine’s MAC Address on LAN?

I know we can spoof mac address of machine that we are currently on, using macchanger or ifconfig wlan0 ether de:ad:be:ef:ca:fe. But I want to make another host on LAN to pret… Continue reading Is it possible to Spoof Another Machine’s MAC Address on LAN?

How is ARP-spoofing of a Modular CMTS online connection via coaxial broadband even possible?

as one can see on the following screen photos / screenshots, I’m permanently getting ARP-spoofed:

My router’s MAC adress should be “90:5C:44:E2:8D:24”, as can be seen on the screenshot of my router’s Web-GUI and on the stick… Continue reading How is ARP-spoofing of a Modular CMTS online connection via coaxial broadband even possible?

Arp Spoofing detects with ruby

I am planning to develop a ruby script which detects arp spoofing attack on local network,I have a few question about it there are 3 scenario in my mind .

  • First idea as always basic idea,
If the ARP poisoning is be exposed my PC and My packets are flowing on the attacker to router, the router’s mac address will be the attacker therewithal attacker ’s mac address will be in my arp table, according this situation there will be duplicate MAC address in the arp table different ıp, according to this,I will read arp table with subprocces (arp -a), If are there any duplicate mac addres ,I think ARP Spoof is done to my, but this is very simple and inadequate



  • If the intruder wants only cut of my internet connection. He can bypass this protection(my script :)), He send ARP packet only router he says victim’s mac address is this, and he sends fake mac address to router about me, there there will be no duplicate entry in arp table for handle this situation , everyone in the network I should send icmp, collect the original mac addresses, and then match them with the mac addresses in the harp table,


  • It is not enough that I wrote above, My plan detect on the network, Intruder may not do anything to me ,not any arp packet to me, can send only the arp packet to another on the network, the same way router I do not know exactly what to do with this situation , I have different idea but am not sure ,I have a few question about this scenario
    is All Arp packet broadcast ? Can I listen to all arp packets in the network? Can I access the router arp table?

I did not find the exact answer to these questions,I need your advice :),and how to handle this problem with ruby ,Where should i look

Continue reading Arp Spoofing detects with ruby