Every time your device connects to a network, a small but critical process happens behind the scenes. Your computer needs to figure out who it's actually talking to. This is where ARP comes in, and where things can go terribly wrong.

What is ARP and Why Does It Matter?

ARP (Address Resolution Protocol) is the translator between two worlds: IP addresses that humans and applications use, and MAC addresses that network hardware understands. When your laptop wants to reach 192.168.1.1, it broadcasts a question: "Hey, who has this IP? Tell me your MAC address."

The response gets stored in your ARP cache, a temporary lookup table that saves time by remembering these mappings. Without it, your network would drown in broadcast traffic.

Here's the problem: ARP was designed in 1982 when networks were trusted environments. There's no authentication. No verification. Anyone can answer that broadcast, and your device will believe them.

The Attack: ARP Spoofing Explained

ARP spoofing (also called ARP poisoning) exploits this trust. An attacker sends fake ARP responses, telling victims:

Once successful, the attacker becomes a man-in-the-middle, invisibly intercepting, reading, or modifying all traffic between victims.

What Attackers Can Do

Attack Type Impact
Credential Theft Capture usernames, passwords, session tokens
Session Hijacking Take over authenticated sessions
Data Manipulation Modify transactions, inject malicious content
Denial of Service Redirect traffic to nowhere
SSL Stripping Downgrade HTTPS to HTTP

The scary part? This all happens at Layer 2. Traditional firewalls won't see it. The traffic looks completely normal from an IP perspective.

Real-World Scenario

Imagine a coffee shop. An attacker connects to the same Wi-Fi as you. They run a simple tool (freely available online) that announces: "I'm the gateway." Your laptop updates its ARP cache. Now, every Google search, every login, every file upload routes through the attacker's machine first.

They can see your bank credentials. Your email. Your corporate VPN login. All while you browse normally, noticing nothing unusual.

Detection: Is Your Network Under Attack?

Watch for these warning signs:

  1. Duplicate MAC addresses - Two IPs claiming the same MAC is a red flag
  2. ARP cache changes - Frequent, unexplained updates to gateway mappings
  3. Network latency spikes - Traffic being rerouted adds delay
  4. Certificate warnings - SSL interception attempts trigger browser alerts

Check your current ARP cache:

# Windows
arp -a

# Linux/macOS
arp -n

If your gateway's MAC address changes unexpectedly, you might have a problem.

Defense Strategies

1. Dynamic ARP Inspection (DAI)

Enterprise switches can validate ARP packets against a trusted database (DHCP snooping binding table). Untrusted ARP responses get dropped.

2. Static ARP Entries

For critical systems, manually define ARP mappings. They won't accept spoofed updates.

# Linux example
sudo arp -s 192.168.1.1 aa:bb:cc:dd:ee:ff

3. Network Segmentation

Limit the blast radius. VLANs prevent attackers from reaching targets in other segments.

4. Encryption Everything

Even if traffic is intercepted, proper TLS makes it useless to attackers. But beware of SSL stripping. Use HSTS and certificate pinning.

5. 802.1X Authentication

Require authentication before devices can send any traffic. Attackers can't spoof if they can't get on the network.

The Bottom Line

ARP cache poisoning is a 40-year-old vulnerability that still works today. It's trivial to execute, difficult to detect, and devastating when successful. Every organization should:

Your network's foundation was built on trust. Modern security means verifying that trust at every layer, especially the ones attackers hope you've forgotten about.