{"id":10199,"date":"2022-12-05T22:05:43","date_gmt":"2022-12-05T21:05:43","guid":{"rendered":"https:\/\/dhosting.pl\/pomoc\/?post_type=manual_kb&#038;p=10199"},"modified":"2023-05-18T16:05:39","modified_gmt":"2023-05-18T14:05:39","slug":"rodzaje-spoofingu-address-resolution-protocol","status":"publish","type":"manual_kb","link":"https:\/\/dhosting.pl\/pomoc\/baza-wiedzy\/rodzaje-spoofingu-address-resolution-protocol\/","title":{"rendered":"Rodzaje spoofingu &#8211; Address Resolution Protocol"},"content":{"rendered":"<h3>Spoofing ARP<\/h3>\n<p><em><strong>Address Resolution Protocol<\/strong><\/em> (<em><strong>ARP<\/strong><\/em>) to protok\u00f3\u0142 umo\u017cliwiaj\u0105cy komunikacji sieciowej dotarcie do konkretnego urz\u0105dzenia w sieci. <em><strong>ARP spoofing<\/strong><\/em>, czasami nazywany r\u00f3wnie\u017c <em><strong>ARP poisoning<\/strong><\/em>, wyst\u0119puje, gdy z\u0142o\u015bliwy aktor wysy\u0142a fa\u0142szywe wiadomo\u015bci <em><strong>ARP<\/strong> <\/em>przez sie\u0107 lokaln\u0105. W ten spos\u00f3b \u0142\u0105czy adres MAC atakuj\u0105cego z adresem IP legalnego urz\u0105dzenia lub serwera w sieci. To po\u0142\u0105czenie oznacza, \u017ce atakuj\u0105cy mo\u017ce przechwyci\u0107, zmodyfikowa\u0107, a nawet zatrzyma\u0107 wszelkie dane przeznaczone dla tego adresu IP.<\/p>\n<h3>Jak zapobiega\u0107 spoofingowi ARP:<\/h3>\n<ul>\n<li>W przypadku os\u00f3b prywatnych najlepsz\u0105 obron\u0105 przed <em><strong>ARP poisoningiem<\/strong><\/em> jest korzystanie z wirtualnej sieci prywatnej (<em><strong>VPN<\/strong><\/em>).<\/li>\n<li>Organizacje powinny stosowa\u0107 szyfrowanie &#8211; np. protoko\u0142y HTTPS i SSH &#8211; aby zmniejszy\u0107 szanse powodzenia ataku <em><strong>ARP poisoning<\/strong><\/em>.<\/li>\n<li>Organizacje powinny r\u00f3wnie\u017c rozwa\u017cy\u0107 zastosowanie filtr\u00f3w pakiet\u00f3w &#8211; filtr\u00f3w, kt\u00f3re blokuj\u0105 z\u0142o\u015bliwe pakiety oraz te, kt\u00f3rych adresy IP s\u0105 podejrzane.<\/li>\n<\/ul>\n","protected":false},"author":6,"featured_media":10957,"parent":0,"menu_order":0,"template":"","format":"standard","manualknowledgebasecat":[2880,121,118],"manual_kb_tag":[3088,3086,655,3068,3517,3058,3053,3087,3516],"class_list":["post-10199","manual_kb","type-manual_kb","status-publish","format-standard","has-post-thumbnail","hentry","manualknowledgebasecat-bezpieczenstwo","manualknowledgebasecat-inne","manualknowledgebasecat-pozostale","manual_kb_tag-address-resolution-protocol","manual_kb_tag-arp-poisoning","manual_kb_tag-hosting","manual_kb_tag-metody-spoofingu","manual_kb_tag-polski-hosting","manual_kb_tag-rodzaje-spoofingu","manual_kb_tag-spoofing","manual_kb_tag-spoofing-arp","manual_kb_tag-web-hosting"],"_links":{"self":[{"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/manual_kb\/10199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/manual_kb"}],"about":[{"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/types\/manual_kb"}],"author":[{"embeddable":true,"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":0,"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/manual_kb\/10199\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/media\/10957"}],"wp:attachment":[{"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/media?parent=10199"}],"wp:term":[{"taxonomy":"manualknowledgebasecat","embeddable":true,"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/manualknowledgebasecat?post=10199"},{"taxonomy":"manual_kb_tag","embeddable":true,"href":"https:\/\/dhosting.pl\/pomoc\/wp-json\/wp\/v2\/manual_kb_tag?post=10199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}