ARP poisoning

Poisoning the ARP table entries of a device and then forwarding them through your machine is one unethical way of capturing the traffic from the target machine.

Let's say, for example, we have the default gateway at IP 192.168.1.1 and one client machine configured at IP 192.168.1.2. Both of these devices are maintaining local ARP cache entries. That enables them to send packets over the LAN. Now, the Wireshark (use arpspoof or ettercap to poison the ARP entries) machine at IP 192.168.1.3 will poison the ARP cache entries by flooding the client and gateway machine with multiple ARP packets, stating to the client PC that the default gateway has been changed to IP 192.168.1.3  and stating the gateway that the client is now at IP ...

Get Wireshark 2 Quick Start Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.