<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: spoofing vs poisoning in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/spoofing-vs-poisoning/m-p/1731585#M557807</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vamsi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ARP poisoning is an attack that is accomplished using the technique of ARP spoofing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ARP spoofing is a technique that allows an attacker to craft a "fake" ARP packet that looks like it came from a different source, or has a fake MAC address in it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An attacker uses the process of ARP spoofing to "poison" a victim's ARP table, so that it contains incorrect or altered IP-to-MAC address mappings for various attacks, such as a man-in-the-middle attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 Apr 2011 17:26:58 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2011-04-15T17:26:58Z</dc:date>
    <item>
      <title>spoofing vs poisoning</title>
      <link>https://community.cisco.com/t5/network-security/spoofing-vs-poisoning/m-p/1731584#M557804</link>
      <description>&lt;P&gt;"hello&lt;/P&gt;&lt;P&gt;Is there any difference between arp poisoning and spoofing"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Vamsi Pinnaka&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofing-vs-poisoning/m-p/1731584#M557804</guid>
      <dc:creator>Vamsi Pinnaka</dc:creator>
      <dc:date>2019-03-11T20:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: spoofing vs poisoning</title>
      <link>https://community.cisco.com/t5/network-security/spoofing-vs-poisoning/m-p/1731585#M557807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vamsi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ARP poisoning is an attack that is accomplished using the technique of ARP spoofing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ARP spoofing is a technique that allows an attacker to craft a "fake" ARP packet that looks like it came from a different source, or has a fake MAC address in it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An attacker uses the process of ARP spoofing to "poison" a victim's ARP table, so that it contains incorrect or altered IP-to-MAC address mappings for various attacks, such as a man-in-the-middle attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Apr 2011 17:26:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofing-vs-poisoning/m-p/1731585#M557807</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-04-15T17:26:58Z</dc:date>
    </item>
    <item>
      <title>Re: spoofing vs poisoning</title>
      <link>https://community.cisco.com/t5/network-security/spoofing-vs-poisoning/m-p/1731586#M557808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you mike. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vamsi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Apr 2011 06:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/spoofing-vs-poisoning/m-p/1731586#M557808</guid>
      <dc:creator>Vamsi Pinnaka</dc:creator>
      <dc:date>2011-04-16T06:31:14Z</dc:date>
    </item>
  </channel>
</rss>

