Posts

Showing posts with the label Spoofing

ARP Poison

Image
In a network, each machine communicates to the other using PHY (MAC) address.  Every system maintain a cache(IP<->MAC) of neighbor system. Manipulating the cache by mapping VICTIM IP to ATTACKER MAC address will result in redirection of data to the ATTACKER instead of VICTIM Commands (To View ARP Table) root:~# arp -a Software Scapy (Packet creation Tool) Setting MAC       => 172.16.84.1      => [ 00:50:56:c0:00:08] =>  VICTIM-1 KALI       => 172.16.84.140 => [ 00:0c:29:c0:22:41 ]   => VICTIM-2 PARROT => 172.16.84.142 => [ 00:0c:29:fe:93:76 ]   => ATTACKER Target ATTACKER(PARROT) needs to sniff the traffic between VICTIM-1(MAC) and VICTIM-2(KALI) Poison the MAC ARP Cache Table(from Parrot) Attacker create spoofed ARP packet (maps attacker PHY address to the VICTIM-2 IP) Attacker send the spoofed ARP packets to the network MAC machine ARP cache ta...