In this chapter, we looked at how we can detect ARP attacks on a system. First, we learned what an ARP attack is and launched one ourselves. Then we saw how to detect an ARP attack, as well as general suspicious behavior with the use of Wireshark.
The next few chapters we are going to look at how we can gain access to the victims machines for which we will be learning about the server-side and client-side attacks.