ARP cache poisoning is something that is done to your host by an external entity sending packets to your host. It is not something that you do on your own host by executing a local command.
I understand—I made a mistake as to how it can be used. But I had the same warning as the one this thread is about before I noticed the blocked ARP poison signature. Then, you also mentioned it, which makes me think my network is compromised. Upon further investigation, I found another
thread on here about the MAC source being apple TV.
Going back to NDP command:
In the context of malicious activity, the `ndp -a -n` command itself doesn't inherently facilitate malicious actions. However, like other diagnostic or administrative tools, in the hands of a malicious actor who has already gained unauthorized access to a system, it could be used for nefarious purposes such as:
1. Network Reconnaissance:
- A malicious actor could use the `ndp -a -n` command to gather information about the network structure, such as the IP and MAC addresses of other devices on the network. This information could potentially be used to plan further attacks or exploits.
2. Information Gathering:
- By executing the command, an attacker could collect data about active nodes on the network, which could be valuable for understanding the network topology and identifying potential targets for attacks.
It's crucial to note that the misuse of the `ndp -a -n` command for malicious purposes would require the malicious actor to have already compromised a system or gained unauthorized access to the network. Under normal circumstances, with proper security measures in place, unauthorized users should not have the ability to execute such commands on a networked system.
Therefore, while the `ndp -a -n` command itself is not malicious, its misuse by malicious actors within a compromised environment could contribute to malicious activity by aiding in network reconnaissance and information gathering.