Reader small image

You're reading from  Python Ethical Hacking from Scratch

Product typeBook
Published inJun 2021
Reading LevelIntermediate
PublisherPackt
ISBN-139781838829506
Edition1st Edition
Languages
Right arrow
Author (1)
Fahad Ali Sarwar
Fahad Ali Sarwar
author image
Fahad Ali Sarwar

Fahad has been teaching ethical hacking and penetration testing on different online platforms with a solid student base. He's passionate about cybersecurity and ethical hacking tool development. Fahad is particularly enthusiastic about Python for its simplicity and ease of use and in this book he has chosen it as a language of preference due to its features.
Read more about Fahad Ali Sarwar

Right arrow

Why do we need ARP?

In the previous chapters, we mentioned what an address resolution protocol is. In this chapter, we will look at it in more depth. In the local network, communication takes place between devices using MAC addresses instead of IP addresses. These are also called link layer addresses. ARP is a request response protocol, which means that one device requests a service and the other one replies in response to that request. Suppose that two devices are present in a network with no external internet connectivity. For them to communicate with each other, they need to rely on a underlying protocol, which is known as the layer 2 protocol. We've already briefly learned about ARP tables. By using an ARP table, a device can maintain a list of all active devices on the network by using a mapping of their IP and MAC addresses. This ARP table technique is quite old and was designed without security considerations in mind. It has some inherent weaknesses that can be exploited...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Python Ethical Hacking from Scratch
Published in: Jun 2021Publisher: PacktISBN-13: 9781838829506

Author (1)

author image
Fahad Ali Sarwar

Fahad has been teaching ethical hacking and penetration testing on different online platforms with a solid student base. He's passionate about cybersecurity and ethical hacking tool development. Fahad is particularly enthusiastic about Python for its simplicity and ease of use and in this book he has chosen it as a language of preference due to its features.
Read more about Fahad Ali Sarwar