![]() ![]() By doing so, we are able to replicate an actual Ethernet LAN that we are able to conduct our lab in. In this task, we will setup two virtual machines using Virtual Box. ![]() Module 1 – Setup lab and conduct initial ARP Poisoning With this type of attack we can set up a Man-in-the-Middle exploit which allows us to sniff traffic between two or more workstations and capture sensitive information such as credentials. In this course, we will conduct an Arp Poisoning/Spoofing attack using Cain and Abel.
0 Comments
Leave a Reply. |