Solved

Network throws up MAC spoofing warning on one PC - How can I trace the root cause and fix the problem.

Posted on 2006-07-20
7
328 Views
Last Modified: 2013-11-16
Hi,

I have been asked to find and fix (or dismiss) the cause of "MAC spoofing detected" errors appearing on one PC on the Network.
The network has approx. 50 devices.  The PC runs Bullguard Internet Security and the security log shows this problem as an ARP reply with no preceding Request.  The event occurs approx every 4 minutes.  I used nbtscan to look at net devices and using this, the Security log, and arp -a have discovered the following.
The Sender of the ARP Reply is always pruporting to be 10.1.1.1
10.1.1.1 is supposed to be the file server on the Network
Approx half the messages have 00-80-c8-b9-f1-c9 as the Sender MAC, the other half are from 00-80-c8-b9-f1-cc (NOTE: only last digit differs !!)
My host PC is 10.1.1.15, and naturally the ARP table changes the MAC associated with 10.1.1.1 each time this message is received
nbtscan (Netbios tracer) links the Server (10.1.1.1) to the first MAC address.

My question is this - Does anyone know the source of the problem ?  Does it represent a weakness in the network ? or a feature of the network to which Bullguard is over-reacting ?  I don't know enough about networking to answer this myself.

Many thanks,   Brian.
0
Comment
Question by:brian_071computing
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
7 Comments
 
LVL 25

Expert Comment

by:Cyclops3590
ID: 17151341
do you have a managed switch? basically do you have a way to determine what machine the mac belongs to.  Both macs belong to Dlink nics.

i know if you have everything going thru a cisco switch you can do a
sh mac-address-table
and see which mac belongs to which port and can atleast help in identifying the problem host

sounds like its something that needs to be looked into though.  could be a compromised host or someone doing something their not suppose to be doing.  this type of attack allows the attacker to redirect network traffic thru their machine "seeing" everything that is going on.  They can then forward that traffic to the correct mac so the orig client doesn't know what is happening.
0
 

Author Comment

by:brian_071computing
ID: 17152739
Hi Cyclops,

I don't work at the place so will have to arrange another visit.  I know they are not Cisco switches, and doubt they are managed ones.  I know about man-in-the-middle attacks but what leads me to believe that this is something different is the fact the the 2 MACs coming from 10.1.1.1 differ by only 1 character  blah-blah-blah-CC and blah-blah-blah-C9 ?
Next time I visit I will try to get a password for the Server and use "getmac" to confirm its MAC....
0
 
LVL 25

Accepted Solution

by:
Cyclops3590 earned 500 total points
ID: 17153277
not really all that means is that the nic were manufacturered in the same run.  But you are looking for a Dlink. Its not pretty, but if there aren't many people you could just go to each computer to see if you could find the computer with the Dlink that has that mac address

while the two macs being relatively close in number might (and I stress might) mean something, I'm still putting my money on the fact that these nics were just in the same run and bought at the same time.  I have a few linksys nic with macs that are in sequence (4 of them).  I bought them all at the same time and was quite impressed that this happened to be honest.
0
Get Actionable Data from Your Monitoring Solution

Your communication platform is only as good as the relevance of the information you send. Ensure your alerts get to the right people every time with actionable responses. Create escalation rules that ensure everyone follows the process and nothing is left to chance.

 

Author Comment

by:brian_071computing
ID: 17171318
Managed to get to the site today.  Used WireShark at 10.1.1.15 and at the File Server 10.1.1.1.  The ARP stuff is all fine at the Server but is still causing the alerts at 10.1.1.15 -  Using a multi-ping tool the device with the offending MAC is not showing up in any ARP table - so will have to visit each PC on network in turn at some stage and see can it be found.  Maybe its malware running that is generating false IP stuff and false MAC identitys just to try to annoy the user of 10.1.1.15 ?  Unfortunately the two 25 port switches are unmanaged, dumb devices.  Well - I'm off for two weeks Holidays in St. Louis, South IL and Memphis, TN.  Will respond on my return,  Thanks, Brian.
0
 
LVL 25

Expert Comment

by:Cyclops3590
ID: 17174662
it probably wouldn't show in any arp table since it'd have to show under a wrong IP.  I take it that it didn't show under the firewalls arp table either?
0
 

Author Comment

by:brian_071computing
ID: 17176156

Hi Cyclops - can't login to the Zyxel modem to check - may get password on my return and look.

Best REgards,  Brian.
0

Featured Post

What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question