How easily can hackers intercept your connection?

A lay person may not have really acknowledged the risk incurred when communicating over insecure channels but hackers particularly have a way of intercepting and modifying traffic through a Man-In-The-Middle (MITM) attack that is achieved when an attacker poisons the Address Resolution Protocol (ARP) cache of two devices with their respective MAC addresses. Provided the attacker is on the same network as the intended victims, an attack can be initiated from the inside of the network and once the ARP cache has been successfully poisoned, each of the victim devices send all their packets to the attacker when communicating to the other device, and the attacker can easily monitor all their communication.

Just to prove this threat, we can run an actual ARP poisoning attack, redirecting the flow of packets and making it flow through a user PC running Windows 7. We shall specifically use a tool called arpspoof which we can use to launch the MITM attack in Kali Linux.

When connected now to the target network, we are going to basically tell the Client that we are the Wi-Fi router, and shall similarly fool the router that we are the Client, and in that way we shall be in the middle of the packet flow, between the Client ( and the Wi-Fi router (, and all the packets will start flowing through our device. We shall first of all find the MAC addresses of the victim (Windows 7) and attacker (Kali Linux). We can see we have the gateway at, and the MAC address 52-54-00-12-35-00 in the figure below.

ARP table for Windows 7
MAC Address for Kali Linux
To start attacking, tell the router that the client IP address has our MAC address
Run arpspoof again and now tell the access point we are the client to eventually flip the IPs

After the attack we check the Windows ARP table and find that it has been successfully poisoned, and the MAC address is changed.

Compromised ARP table

So, what’s the way forward?

  • Set up static ARP entries in the ARP cache for any two hosts that communicate regularly with each other. Static IP address-to-MAC address mappings in the local ARP cache will prevent spoofing to a considerable degree.
  • Use ARP spoofing detection tools that can block illegitimate ARP packets. AntiARP, for instance provides Windows-based spoofing prevention at the kernel level, and ArpStar which is a Linux module for kernel 2.6 and Linksys routers, drops invalid packets that violate mapping and contains an option to heal. Similarly, Dynamic ARP Inspection (DAI) in Cisco Catalyst 6500 Series Switches discards ARP packets with invalid IP addresses, such as or, and ARP packets containing MAC addresses in their payloads that do not match the addresses specified the Ethernet headers.
  • A Virtual Private Network (VPN) will secure your online activities through an encrypted tunnel.

It has been noticed over time that people are the weakest link in enforcing security and in that regard, Summit Consulting Ltd brings you a Cyber Security Awareness Training  course at your premises to bring forth awareness on the various forms of cybercrime and attack schemes that could be executed on your network, alongside the defensive measures.

Join Summit Consulting Ltd in partnership with IFIS on our annual cyber-security awareness and risk management conference, which is scheduled to take place from the 16th – 18th October 2019. You need to get sensitized about all forms of fraudulent practices that can render your company insecure, followed by recommended remedies against those practices.

Share this

Leave a Comment


Scroll to Top
Chat with us
Chat with us
Questions, doubts, issues? We're here to help you!
None of our operators are available at the moment. Please, try again later.
Our operators are busy. Please try again later

The data collected by this form is used to get in touch with you. For more information, please check out our privacy policy
Have you got question? Write to us!

The data collected by the chat form is used to get in touch with you. For more information, please check out our privacy policy
This chat session has ended
Was this conversation useful? Vote this chat session.
Good Bad