Security Lab 2 Report
Security Lab 2 Report
Security Lab 2 Report
1- Environment Setup
2- ARP Exploration
After
2
4- Mitigation
1. Static ARP Entries: Configure static ARP entries on critical network devices. By
manually specifying the MAC address associated with each IP address in the
ARP cache, you prevent attackers from poisoning the ARP cache with falsified
mappings. However, this approach can be administratively intensive and may not
be practical in large networks.
4. Port Security: Utilize port security features on network switches to restrict the
number of MAC addresses allowed to communicate through each switch port. By
binding specific MAC addresses to switch ports, you can prevent unauthorized
devices from sending ARP packets and participating in ARP poisoning attacks.
6. Monitoring and Logging: Regularly monitor network traffic and log ARP-related
events to identify potential signs of ARP poisoning or other malicious activities.
Analyzing network logs can help detect and mitigate ARP spoofing attacks in a
timely manner, allowing for proactive response measures to be taken.