![D-Link DES-3028 Скачать руководство пользователя страница 353](http://html.mh-extra.com/html/d-link/des-3028/des-3028_cli-reference-manual_77883353.webp)
DES-3028 DES-3028P DES-3028G DES-3052 DES-3052P Layer 2 Fast Ethernet Switch CLI Reference Manual
348
Destination
address
Source address
Ethernet
type
H/W type
Protocol
type
H/W
address
length
Protocol
address
length
Operation Sender
H/W
address
Sender
protocol
address
Target H/W
address
Target
protocol
address
(6-byte) (6-byte)
(2-byte)
(2-byte)
(2-byte)
(1-byte)
(1-byte)
(2-byte) (6-byte) (4-byte) (6-byte) (4-byte)
FF-FF-FF-FF-FF-FF 00-20-5C-01-11-11
806
ARP reply
00-20-5C-01-11-11 10.10.10.254 00-20-5C-01-11-11 10.10.10.254
Table – 5
A common DoS attack today can be done by associating a nonexistent or any specified MAC address to the IP address of the
network’s default gateway. The malicious attacker only needs to broadcast ONE Gratuitous ARP to the network claiming it is the
gateway so that the whole network operation will be turned down as all packets sent through the Internet will be directed to the
wrong node.
Likewise, the attacker can either choose to forward the traffic to the actual default gateway (passive sniffing) or modify the data
before forwarding it (man-in-the-middle attack). The hacker fools the victims PC to make it believe it is a router and fools the
router to make it believe it is the victim. As can be seen in Figure-5 all traffic will be then sniffed by the hacker without the users
knowledge.
Figure – 5
Gratuitous ARP
Ethernet Header