{"title":"Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types","authors":"Jaewon Choi","doi":"10.6109/jkiice.2017.21.1.61","DOIUrl":null,"url":null,"abstract":"ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing. 키워드 : ARP 스푸핑, ARP 스니핑, ARP 스푸핑 공격, ARP 스푸핑 해킹, 네트워크보안 Key word : ARP Spoofing, ARP Sniffing, ARP Spoofing Attack, ARP Spoofing Hacking, Network Security Received 27 September 2016, Revised 29 September 2016, Accepted 13 October 2016 * Corresponding Author Jae-Won Choi(E-mail:choejw@ks.ac.kr, Tel:+82-51-663-4786) Department of Computer Science and Engineering, Kyungsung University, Busan 48434, Korea Open Access http://doi.org/10.6109/jkiice.2017.21.1.61 print ISSN: 2234-4772 online ISSN: 2288-4165 This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License(http://creativecommons.org/li-censes/ by-nc/3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. Copyright C The Korea Institute of Information and Communication Engineering. Journal of the Korea Institute of Information and Communication Engineering 한국정보통신학회논문지(J. Korea Inst. Inf. Commun. Eng.) Vol. 21, No. 1 : 61~71 Jan. 2017","PeriodicalId":136663,"journal":{"name":"The Journal of the Korean Institute of Information and Communication Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Journal of the Korean Institute of Information and Communication Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.6109/jkiice.2017.21.1.61","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing. 키워드 : ARP 스푸핑, ARP 스니핑, ARP 스푸핑 공격, ARP 스푸핑 해킹, 네트워크보안 Key word : ARP Spoofing, ARP Sniffing, ARP Spoofing Attack, ARP Spoofing Hacking, Network Security Received 27 September 2016, Revised 29 September 2016, Accepted 13 October 2016 * Corresponding Author Jae-Won Choi(E-mail:choejw@ks.ac.kr, Tel:+82-51-663-4786) Department of Computer Science and Engineering, Kyungsung University, Busan 48434, Korea Open Access http://doi.org/10.6109/jkiice.2017.21.1.61 print ISSN: 2234-4772 online ISSN: 2288-4165 This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License(http://creativecommons.org/li-censes/ by-nc/3.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. Copyright C The Korea Institute of Information and Communication Engineering. Journal of the Korea Institute of Information and Communication Engineering 한국정보통신학회논문지(J. Korea Inst. Inf. Commun. Eng.) Vol. 21, No. 1 : 61~71 Jan. 2017