-
In the current state, the IP on the right of the MAC's gateway is your IP address and the physical address of your machine. If it's a LAN, it's your gateway on top, "Host."'Physical address. ARP attacks are generally impersonating someone else to attack you - the attack shown ** - your gateway!
Color shadows, hehe, generally can't find the real IP of the attack, and can't prevent it. What can be attacked and defended - so that everyone has some scruples and everything is fine!! It is advisable to fight back with a network management (e.g. Jusheng) or something like -- and you can also find out which one is attacking your IP by the traffic
-
Fill in the IP of the route and the MAC Generally, the IP of the route is the LAN port of the MAC to route by itself If there is no password for the route, the default password for the route is the user name: admin password admin If it is not possible to get it automatically or scan it with software, you can fill it in yourself after seeing the MAC of the route.
-
Just don't get the gateway automatically.
Turn on the ARP firewall and bind it manually.
-
See if immune network solutions and immune walls can help you solve these problems.
-
Color Shadow Firewall itself is a firewall to prevent ARP attacks, it has the function of preventing ARP cache table from being tampered with by default, how to check whether this function is on: Tools > Advanced parameter settings Point Security Options: Security Protection You take a look at whether the "Prohibit modification of ARP cache table" is checked in front of it, if not, hit it!
-
4.Static ARP binds the gateway.
Step 1: When you can access the Internet normally, go to the MS-DOS window, enter the command: arp a, check the correct MAC address corresponding to the IP address of the gateway, and record it.
Note: If you are no longer able to access the Internet, run the command arp d once to empty the content in the ARP cache, and the computer can temporarily resume surfing the Internet (if the attack does not stop). As soon as you are able to access the Internet, disconnect the network (disable the network card or unplug the network cable) and run ARP A.
Step 2: If the computer already has the correct MAC address of the gateway, you can simply bind the gateway IP address to the correct MAC address manually to ensure that the computer is no longer spoofed by spoofing attacks.
To manually bind, run the following command in the ms-dos window:
ARP S Gateway IP Gateway MAC
cocuments and settings>arp -a
- 0x2internet address physical address type
00-01-02-03-04-05 dynamic
00-01-02-03-04-05 is the MAC address of the gateway, and the type is dynamic, so it can be changed.
After being attacked, use this command to check again, and you will find that the MAC has been replaced with the MAC of the attacking machine. If you want to find out the attacking machine and attack it completely, you can record the MAC at this time to prepare for finding the attacking machine in the future.
The command for manual binding is:
arp -s 00-01-02-03-04-05
-
1. Enter cmd in Run or Search, right-click on the cmd command line, select Administrator Privileges, enter 2, enter netsh, enter network settings, enter "i i" and note the space, and enter IPv4 settings.
3. Enter "show in" to check the port number, find the port number corresponding to the network connection, win7 is generally 11
4. Enter Set neighbors, port number, gateway IP address, and physical address of the gateway.
-
Default Broadband Dialing Delete Set a new one.
-
That is, whether arp -d is unbound or not, check it with arp -a, and you can find out that it is not tied, and it is displayed dynamically after the mac address, and it is static
-
The color shadow is good, and if you prompt an attack, you can intercept it, and it won't affect you if you intercept it.
If it really has an impact, you tell the landlord to ask for the password of the router, and after entering, block the MAC of the attack source, that is, prohibit its information from passing through the router, so that he can't get on the Internet, and when he can't hold back, he will take the initiative to stand up and clarify.
-
Ask for the password of the router, and block the MAC of the attack source after entering, so that he can't access the Internet, and when he can't hold back, he will take the initiative to stand up and clarify.
Hands caused!
-
I'm in the same situation now, and I don't know what to do.
-
For ARP attacks, you can use the router to bind the local MAC address, and then use the Rising Firewall to bind the MAC address of the gateway.
-
arp -s native ip native mac
ARP S Gateway IP Gateway MAC
Both are tied. On the gateway, you need to bind the MAC corresponding to each IP address