Command line and Graphical interface comparative analysis for ARP Poisoning through Ettercap

Authors

  • Prudhviraj S Dept. of Computer Science, Mahatma Gandhi Institute of Technology, Hyderabad, India
  • Sudha C Dept. of Computer Science, Mahatma Gandhi Institute of Technology, Hyderabad, India

DOI:

https://doi.org/10.26438/ijcse/v6i10.679683

Keywords:

Address Resolution Protocol (ARP), ARP Poisoning, Man in The Middle Attack, Ettercap, Attacker, Victim, Ethernet or Local Area Network (LAN)

Abstract

There has been many changes taking place in the recent arena of Address Resolution Protocol (ARP) Poisoning from the command line interpretation to the graphical interfaces that are developed. The process of ARP Poisoning is one of the famous techniques amongst present Man in The Middle (MITM) attacks. It is applicable to access the various unsecured websites authentication details which can be captured by the attacker and can be visualized on both the command line and graphical user interface (GUI). The entire process or communication takes place through the ethernet or local area network (LAN) and the result of the poisoned address is the physical address of the LAN which acts as a common interface between both the attacker and victim’s machine. This paper, there by explains the entire mechanism of ARP Poisoning that takes place through the LAN by both the command line interpretation (CLI) and the GUI Ettercap which shows the differences amongst both the methods and determines the best method which has the least complexity

References

[1] Mauro Conti, Nicola Dragoni, Viktor Lesyk, "A Survey of Man In The Middle Attacks”, Communication surveys & Tutorials IEEE, vol. 18, no. 3, pp. 2027-2051, 2016.

[2] Navid Behboodian, “ARP Poisoning attack: “An introduction to attack and mitigations”, vol.1, 2 Jan 2012.

[3] Sudhakar, R.K. Aggarwal, A Survey on Comparative Analysis of Tools for detection of ARP Poisoning, International Conference on Telecommunication and Networks, 2017.

[4] C. Hornig, Standard for the transmission of IP datagrams over Ethernet networks, Internet Engineering Task Force, RFC 826, November 1982.

[5] D. Plummer, An ethernet address resolution protocol, Nov.2010, RFC 826

[6] Kyokyedk Kwon, Seongjin Ahn, Jinwook Chung, "Network Security Management Using ARP Spoofing", pp. 142-149, 2004.

[7] Behrouz A. Forouzan, "Data Communications and Networking" in, Mc Graw Hill, pp. 678-680, 2007.

[8] D. Bruschi, A. Ornaghi, and E. Rosti, S-arp: a secure address resolution protocol in Computer Security Applications Conference, 2003. Proceed-ings. 19th Annual. IEEE, 2003, pp. 66 -74.

[9] S. Jadhav and Mandal,” A survey on network security for open source,” IEEE International Conference of Current Trends in Advanced Computing (ICCTAC), pp. 1-6,2016.

Downloads

Published

2025-11-17
CITATION
DOI: 10.26438/ijcse/v6i10.679683
Published: 2025-11-17

How to Cite

[1]
S. Prudhviraj and C. Sudha, “Command line and Graphical interface comparative analysis for ARP Poisoning through Ettercap”, Int. J. Comp. Sci. Eng., vol. 6, no. 10, pp. 679–683, Nov. 2025.

Issue

Section

Research Article