2CAPTURING TRAFFIC WITH ARP SPOOFING

Pay no attention to the man behind the curtain!

–Noel Langley, The Wizard of Oz

image

Anyone who walks into a coffee shop and connects to its Wi-Fi network can intercept and view other users’ unencrypted web traffic using a technique called ARP spoofing, which exploits a vulnerability in the design of the address resolution protocol (ARP). In this chapter, we explain how ARP works, describe the steps of an ARP spoofing attack, and then perform one ourselves.

How the Internet Transmits Data

Before we can discuss ARP spoofing, we must first understand the internet’s general structure. This section describes how the ...

Get Ethical Hacking now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.