hello,

I'm doing some tests with arpwatch and an arpwatch log doesn't fire
any rules by default.

I perform a man in the middle attack with nemesis (nemesis arp -S
X.X.X.X -D Y.Y.Y.Y -h cc:cc:cc:cc:cc:cc), where X.X.X.X is the spoofed
IP address, Y.Y.Y.Y is my target and cc:cc:cc:cc:cc:cc is the mac
address of my "devil" machine which perform the attack. After this,
Y.Y.Y.Y target will have the couple X.X.X.X/cc:cc:cc:cc:cc:cc on his
arp cache.

When I'm doing this I have this kind of arpwatch logs:
Aug  10 03:10:59 testsrv arpwatch: ethernet mismatch X.X.X.X
cc:cc:cc:cc:cc:cc (aa:aa:aa:aa:aa:aa) eth2

(where aa:aa:aa:aa:aa:aa is the real mac address of my "evil" machine)

So, I added a rule, because I want to be aware of a MitM attack
attempt.

the rule:
<rule id="170030" level="12">
    <if_sid>7200</if_sid>
    <match>ethernet mismatch</match>
    <description>The source mac Ethernet address didn't match the
address inside the arp packet, probably aprspoofing attempt</
description>
    <group>ip_spoof,</group>
  </rule>

May be some of you are interested by this log and  the rule?

AB

Reply via email to