In this Activity we will find CCNA 5.3.3.2 – ARP Spoofing. This Activity for getting knowledge of ARP Spoofing. In last lecture we discuss about CCNA 5.3.3.1 – ARP Broadcasts.



CCNA 5.3.3.2 – ARP Spoofing

In CCNA 5.3.3.2 – ARP Spoofing, ARP spoofing is a type of attack in which a malicious actor sends falsified ARP (Address Resolution Protocol) messages over a local area network. In some cases, the use of ARP can lead to a potential security risk known as ARP spoofing or ARP poisoning.




This is a technique used by an attacker to reply to an ARP request for an IPv4 address belonging to another device, such as the default gateway, as shown in the figure. The attacker sends an ARP reply with its own MAC address. This results in the linking of an attacker’s MAC address with the IP address of a legitimate computer or server on the network. The receiver of the ARP reply will add the wrong MAC address to its ARP table and send these packets to the attacker.

CCNA 5.3.3.2 - ARP Spoofing
CCNA 5.3.3.2 – ARP Spoofing



Enterprise level switches include mitigation techniques known as dynamic ARP inspection (DAI). DAI is beyond the scope of this course. From the way of affecting network connection, there are two possible ARP attacks, one is cheating router and other one is cheating computers.

One thought to “CCNA 5.3.3.2 – ARP Spoofing”

Leave a comment

Your email address will not be published. Required fields are marked *