Where are mac addresses stored for future reference?

broken image

Communication between the two hosts can then proceed as usual. When the host being attacked attempts to communicate with the disabled host the attacker's system responds to any ARP request broadcasts, thus inserting its MAC address in the attacked host's ARP cache.

broken image
broken image

ARP spoofing relies on disabling a host on the network so that it cannot reply to any ARP request broadcasts and then subsequently configuring the disabled host's IP address on the attacking host. ARP spoofing can be used by an attacker in order to attempt to compromise the system.