On Wed, Jan 29, 2014 at 2:28 AM, Russ Michaels wrote:

> perhaps this will help.
> http://www.watchguard.com/infocenter/editorial/135324.asp


That is the traditional ARP attack in which the request is broadcasted and
the reply has the IP address. That has the consequence of redirecting
normal, local traffic to the spoofed address.
That does nothing to explain how you flood ARP requests to an IP address.
ARP runs on ethernet, not on IP, so it can not have an IP address as a
destination, only an ethernet address.

Jochem

-- 
Jochem van Dieten
http://jochem.vandieten.net/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:357517
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

Reply via email to