You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/immune/arp_poisoning.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,10 +9,11 @@
9
9
10
10
# ARP Poisoning
11
11
12
-
The ARP Poisoning is designed as a part of the Slips Immune, where Slips takes down attackers using ARP poisoning in addition to blocking them through the firewall, protecting the rest of the local network before the attacker reaches them.
The ARP Poisoning Module is designed as a part of the Slips Immune, where Slips takes down attackers using ARP poisoning in addition to blocking them through the firewall, protecting the rest of the local network before the attacker reaches them.
Whether the attacker is connected to the AP on the RPI or connected directly to the router’s WIFI, once Slips detects an alert, it does the following
28
+
Whether the attacker is connected to the AP on the RPI or connected directly to the router, once Slips detects an alert, it does the following
28
29
29
-
1.Isolates the attacker from the internet by sending an ARP request to the attacker announcing the gateway at a fake mac, so it’s no longer reachable.
30
+
1.Cuts the attacker's internet by sending an ARP request to the attacker announcing the gateway at a fake mac, so it’s no longer reachable.
30
31
31
-
2. Isolates the attacker from the rest of the network by sending a gratioutos ARP request announcing the attacker at a fake mac, so it’s no longer reachable by the rest of the network.
32
+
2. Isolates the attacker from the rest of the network by sending a gratuitous ARP request announcing the attacker at a fake mac, so it’s no longer reachable by the rest of the network.
32
33
33
-
3. Regularly sends ARP replies for all hosts in the network announcing the attacker at a fake MAC so it doesn’t give the attacker time to reply with it’s real MAC and be reached by the rest of the network..
34
+
3. Regularly sends ARP replies for all hosts in the network announcing the attacker at a fake MAC so the attacker doesn't have enought time to reply with its real MAC and be reached by the rest of the network.
34
35
35
-
These attacks are done on a loop until the blocking period is over to ensure that the attacker is still isolated even after the ARP cache expires.
36
+
These attacks are done in a loop until the blocking period is over to ensure that the attacker stays isolated even after the ARP cache expires.
36
37
37
38
38
39
### Slips on a host’s computer in the network
@@ -49,13 +50,13 @@ Even if Slips is not controlling the AP where the rest of the clients are connec
49
50
50
51
## Unblocking
51
52
52
-
Slips doesn’t keep poisoning attackers forever once they’re detected, instead, it implements a probation period of one timewindow. Meaning, it blocks the attacker for the rest of this timewindow and one extra timewindow once an alert is generated, if Slips receives no more attacks during that extra timewindow from this attacker, it unblocks the attacker after that timewindow is over, if it receives more attacks, it extends the blocking/probation period by one more timewindow.
53
+
Slips doesn’t keep poisoning attackers forever once they’re detected, instead, it implements a probation period of one timewindow. Meaning, it blocks the attacker for the rest of this timewindow and one extra timewindow once an alert is generated, if Slips detects no more attacks during that extra timewindow from this attacker, it unblocks the attacker after the probation period is over. if Slips detects more attacks, it extends the blocking/probation period by one more timewindow.
53
54
54
-
This way, the more attacks the attacker does, the longer slips will Isolate them.
55
+
This way, the more attacks the attacker does, the longer Slips will isolate them.
55
56
56
-
Once the blocking period is over, Slips stop poisoning the attacker, which restores its internet connection, and stops announcing the attacker at a fake MAC, which allows the rest of the network to reach it.
57
+
Once the blocking period is over, Slips stops poisoning the attacker, which restores its internet connection, and stops announcing the attacker at a fake MAC, which allows the rest of the network to reach it.
57
58
58
-
Blocking and unblocking are tracked in arp\_poisoning.log in the output directory.
59
+
Blocking and unblocking are tracked in arp_poisoning.log in the output directory.
0 commit comments