ARP-poisoning, ARP-spoofing

A man-in-the-middle type cyberattack based on defects in the ARP protocol, which is used for resolving MAC addresses by IP and identifying devices in the network. Exploiting ARP weaknesses, an attacker can intercept a request to search for a host and register their own computer instead. The attacker is thus able to intercept and modify traffic sent to the device.