Wireshark 101: Address Resolution Protocol, HakTip 124

Поділитися
Вставка
  • Опубліковано 29 сер 2024

КОМЕНТАРІ • 21

  • @daviangel
    @daviangel 9 років тому +9

    Thumbs up just for the way she says ARP ARP ARP!
    Man my networking classes would've have been so much more fun with Shannon in them and I would've actually went to class LOL.

  • @DS-ce4um
    @DS-ce4um 9 років тому +16

    Great video! But I just wanted to add some supplemental information regarding ARP requests:
    ARP is used to match IP addresses to MAC addresses. MAC addresses are needed for a computer to know where to send information to on the data-link layer (OSI model). Because of this, your computer can't talk to other computers with just an IP address, it needs the MAC address.
    Your computer keeps MAC Addresses stored in the ARP table. If it doesn't have an entry for an IP address, it sends out a broadcast to all devices on the network asking 'Who has this IP?'. All devices on the network will hear this message, but only the one with the correct IP will respond and say "I do! Here is my MAC address!".
    Once it does that, your computer will add an entry for that IP address into its MAC table and the devices can now communicate.
    Why this is important to Wireshark:
    If you are seeing ARP requests for IPs that don't exist on your network, it's possible that someone is doing a ping scan (potentially malicious) or a service is misconfigured. You can use bad ARP requests to track down the PC that is sending them out and investigate why it is happening.

    • @hak5
      @hak5  9 років тому +1

      David Sullivan Great info! Thanks for sharing.

    • @Daniel_CLopes
      @Daniel_CLopes 6 років тому

      Awesome!

  • @Ferocious_Imbecile
    @Ferocious_Imbecile 7 років тому +1

    It doesn't answer all my questions but it goes a long way to helping me learn all this stuff. Thanks for the video.

  • @robinsmidsrod
    @robinsmidsrod 9 років тому +4

    Would've liked to see a reply packet analyzed too. Just seeing one part of the conversation is a bit unfortunate. An arp poisioning attack would also be interesting.

    • @FunIsGoingOn
      @FunIsGoingOn 9 років тому +3

      Request and reply packets have the same format, so they could be analysed accordingly. There are sample captures on wireshark.org. Arp Posioning was coveres in hak5's very first season like 5 years ago, just search for hak5 arp poisoning like watch?v=EF3kZF6MLUo and watch?v=7YAhi0aikT8 and watch?v=7FQO5jisQoI ...

  • @germansanchez4391
    @germansanchez4391 9 років тому

    Love the way you teach this stuff you make it understandable

  • @kreep182
    @kreep182 7 років тому +1

    thats exactly what i needed. thanks alot.

  • @jackofallthings1764
    @jackofallthings1764 5 років тому

    What would you consider too many ARP requests? Where does normal traffic end and where does a broadcast begin?

  • @KowboyUSA
    @KowboyUSA 9 років тому

    Another one for the Favs folder.

  • @jamesrodriguez8494
    @jamesrodriguez8494 9 років тому +1

    What does the protocol say(or Shannon) , ARP ARP, ARP

  • @SP-rj1xc
    @SP-rj1xc 2 роки тому

    How do I find the Source and Destination though?

  • @rob-karenkennedy-parker3166
    @rob-karenkennedy-parker3166 6 років тому

    Great video. Ty.

  • @Rockyx01
    @Rockyx01 9 років тому

    Awesome!

  • @deadccie7011
    @deadccie7011 8 років тому

    which type of broadcast ARP do. How ARP packet look like.

  • @joeli0820
    @joeli0820 9 років тому

    Arp arp arp arp arp arp I would say that for a while when I learn about arp in my class that used the Cisco networking academy aka netacad