Back to Blog
Linux arpspoof7/1/2023 ![]() Computer A believes it is communicating with Computer B, but because of the poisoned arp table, the communication actually goes to the attacker's computer. Since arp keeps no state information, the arp cache can be overwritten (unless an entry is explicitly marked as permanent).Īrp cache poisoning puts the attacker in position to intercept communications between the two computers. One such way is to spoof your MAC address and poison the arp table. Even in this switched environment, there are ways to sniff other devices' packets. In a switched environment, packets are only sent to devices that they are meant for. This process requires that the systems on the network maintain a table associating MAC addresses to ports. ![]() In a switched network environment, packets are sent to their destination port by MAC address. ![]()
0 Comments
Read More
Leave a Reply. |