# ARP Spoofing | Poisoning Explained

## Метаданные

- **Канал:** PowerCert Animated Videos
- **YouTube:** https://www.youtube.com/watch?v=cZ-7R8juECk
- **Источник:** https://ekstraktznaniy.ru/video/30219

## Транскрипт

### Segment 1 (00:00 - 03:00) []

Hello everyone. In this video, we're going to be talking about ARP spoofing. So the first thing we have to discuss is well what is ARP? Now ARP stands for address resolution protocol and this is a protocol that is used to resolve IP addresses to MAC addresses. The MAC address is the physical address of a device. It's a globally unique number that is assigned to every network interface card. Whenever a device on the network wants to communicate with another device on the network, it needs the MAC address of that device because this is ultimately how devices on the network communicate with one another. They use the MAC address. So for example, if this computer here wants to communicate with this router, the computer first needs the router's MAC address. So what happens is that the computer will send out a broadcast. using the router's IP address asking for the router's MAC address and then the router will respond back telling the computer that I am that IP address and it'll respond back with its MAC address and then once the computer has the MAC address, it can now communicate with the router. Now, when the computer receives a MAC address, it'll store the router's IP address with the router's corresponding MAC address in its table called an ARP cache. So now, anytime the computer wants to talk to the router, it already knows the MAC address because it's stored in its ARP cache. But if a hacker on this network wanted to intercept the data that's being communicated between the computer and the router, the hacker can do an ARP spoofing. Spoofing means that something is fake. It's when a device impersonates another device in order to intercept and steal data. So what happens is that a hacker and his computer will join the network and then the hacker's computer will send out a response on the network informing the computer that the device with the IP address of 192. 168. 0. 1 which is the router has a different MAC address. So, the hacker is spoofing the router's IP address, and then the computer will receive the response and store the updated MAC address in its ARP cache, thinking that it's the MAC address of the router, but in reality, hacker's computer. So now whenever the computer wants to communicate with the router, it's actually communicating with the hacker's computer first and then the hacker's computer will for the data to the router. So the hacker is sitting in between both devices and it can now see all the communication between the computer and the router. So this is known as ARP spoofing. And since the hacker is now in the path of these two devices, this is also known as an onpath attack or a man in the middle attack. So guys, I want to thank you for watching this video. Please subscribe and I will see you in the next video.
