If you’ve read the previous article on ARP, you already know how the protocol works, devices broadcast a “who has this IP?” and whoever owns it replies with their MAC address, no authentication involved. That last part is the reason this article exists. No authentication gives us an attack surface. ARP was designed in a […]
Categories
ARP Spoofing and Poisoning with Scapy