On Wed, Jan 29, 2014 at 2:28 AM, Russ Michaels wrote: > perhaps this will help. > http://www.watchguard.com/infocenter/editorial/135324.asp
That is the traditional ARP attack in which the request is broadcasted and the reply has the IP address. That has the consequence of redirecting normal, local traffic to the spoofed address. That does nothing to explain how you flood ARP requests to an IP address. ARP runs on ethernet, not on IP, so it can not have an IP address as a destination, only an ethernet address. Jochem -- Jochem van Dieten http://jochem.vandieten.net/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Order the Adobe Coldfusion Anthology now! http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion Archive: http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:357517 Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm

