Skip to main content
The 2024 Developer Survey results are live! See the results

You are not logged in. Your edit will be placed in a queue until it is peer reviewed.

We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.

6
  • I don't agree: imho, running a ARP-spoofing based MITM attack on a properly secured network is not possible (or at least not "basically trivial").
    – jjmontes
    Commented Jun 27, 2018 at 12:41
  • 4
    @jjmontes - 'properly secured' is not a phrase you can assume is applicable to most networks. Commented Jun 27, 2018 at 16:52
  • @jjmontes mind expanding ? I know very few networks where disabling ports with more than 2 or 3 mac addresses (phone, computer and maybe another device) is active, so turning a port into a copycat to get all traffic is not often a problem.
    – Tensibai
    Commented Jun 29, 2018 at 13:24
  • In more secure networks, MAC addresses, IPs, switch ports (and cabling) and ARP tables in switches and routers are static. Afaik, a user of such network could not get traffic from any other port except by physical access, and any use of an incorrect MAC will block the port and be reported (though admitedly, this is not the case in most networks). Also, this doesn't mean the OP shouldn't encrypt intranet connections.
    – jjmontes
    Commented Jun 29, 2018 at 13:45
  • 1
    @jjmontes Static ARP is only supported in managed switches, imposes rather extreme management headache, and generally is not likely to be used in this scenario. Switches from the likes of Cisco do layer 3 snooping of ARP and use special magic to guess when ARP replies are bogus... this is disabled by default in Cisco hardware due to false positives. There are things like 802.11x with one mac/port... still requires expensive switches and a radius server. In any case none of these are even remotely close to the security that HTTPS provides for almost nothing out of the box. Commented Jul 1, 2018 at 7:49