My computer often has that ARP attack, how to eliminate it, what is the impact of ARP attack on the

Updated on technology 2024-03-29
3 answers
  1. Anonymous users2024-02-07

    ARP Buster establishes a real address resolution table in the whole network and distributes it to each managed network node. By filtering each packet at the NIC driver layer, it can not only identify and prohibit ARP spoofing, but also accurately locate which IP node, process, and login are the source of ARP spoofing, thus completely solving the problem of ARP attacks. Intelligent network - ARP Buster Solution:

    1.Intercept ARP attacks: a

    Intercept external false ARP packets at the kernel layer of the system to ensure that the system is not affected by ARP spoofing and ARP attacks, and maintain smooth network and communication security. b.The external ARP attack packets of the local machine are intercepted at the kernel layer of the system to reduce the trouble caused by external attacks after being infected with malicious programs. 2.

    Intercept IP conflicts. Intercept IP conflict packets at the kernel layer of the system to ensure that the system is not affected by IP conflict attacks. 3.Safe mode.

    Except for the nodes protected by the gateway and installation client, it does not respond to ARP requests sent by other machines, achieving the stealth effect and reducing the probability of ARP attacks. 4.ARP data analysis. Analyze all ARP packets received by the local machine, grasp the network dynamics, and find out potential attackers or poisoned machines; 5.

    Track down the attacker. After the attack is discovered, the attacker's IP address is automatically and quickly locked. 6.ARP virus pinpointing.

    When it is found that the machine has external attacks, it will automatically locate the malicious programs and virus programs infected by the machine; 7.ARP cache protection. Prevent malicious programs from tampering with the local ARP cache.

    8.Self-process protection. Prevent termination by malware. **。

  2. Anonymous users2024-02-06

    **360, employing ARP, firewall is good. It is recommended that you use the two-way binding method to solve the problem and prevent ARP spoofing. 1. Bind the IP and MAC address of the router on the PC

    1) First, get the MAC address of the router's intranet (for example, the MAC address of the Hiper gateway address is 0022aa0022aa). 2) Write a batch file as follows: @echo off arp -d arp -s 00-22-aa-00-22-aa Change the gateway IP address and MAC address in the file to your own gateway IP address and MAC address.

    Drag this batch software into "Windows--Start--Program--Start". 3) If it is an Internet café, you can use the paid software server program (pubwin or Vientiane) to send batch files to the startup directory of all clients. The default boot directory for Windows 2000 is "C:

    documents and settings all users Start Menu Program Start". 2. Bind the IP and MAC address of the user host on the router (supported by router software versions after 440): Bind each host of the LAN in the HIPER management interface - advanced configuration - user management.

  3. Anonymous users2024-02-05

    Open Notepad and copy this ** to @echo offcolor 0aecho program is executing, please wait for ipconfig%find"physical address" %ipconfig% >macadd%for /f "skip=2 tokens=12"%%m in (%macadd%) do set mac=%%mecho get native NIC mac:%mac%. ping -n 2 > nulfind "ip address" %ipconfig% >ipadd%for /f "skip=2 tokens=15"%%i in (%ipadd%) do set ip=%%iecho to get the native IP address:

    ip%。ping -n 2 > nularp -s %ip% %mac%echo bind native ip and mac, success. ping -n 2 > nulfind "default gateway" %ipconfig% >gateadd%for /f "skip=2 tokens=13"%%g in (%gateadd%) do set gateip=%%gecho to get the gateway IP address:

    gateip%。ping -n 2 > nularp -a %gateip% >gatemacadd%for /f "skip=3 tokens=2"%%h in (%gatemacadd%) do set gatemac=%%hecho get gateway mac:%gatemac%.

    ping -n 2 > nularp -s %gateip% %gatemac%echo bind the gateway NIC and MAC address, successful. exit, then, save it to run it and it's OK

Related questions
15 answers2024-03-29

As long as you turn on the automatic update, there is no system vulnerability, do not access the malicious**, do not mess up the mess, hackers also take you every way, hacking also has to have vulnerabilities in your computer, the computer is slow, it may be that there is too much garbage in your computer, clean it up with 360, it will work, and it is necessary to reinstall the system after a long time.

13 answers2024-03-29

It's a serious problem! You can learn about it in a few ways: >>>More

8 answers2024-03-29

You add my mailbox, and I'll send you a good firewall, which is free forever. >>>More

10 answers2024-03-29

x8 sales management system.

In addition to the traditional cashier function, and the purchase, sale and storage function, there is also a complete member management function. >>>More

31 answers2024-03-29

I think if he comes like this every day, you can arrange something for him to eat just to make money for himself, so that he can eat outside.