What's the best way to get in between a conversation when it is not possible to physically be in line? Well, that's with spoofing attacks of course. Spoofing attacks are a fundamental requirement for attacks where you are in between a conversation or man-in-the-middle as it's often referred to. Spoofing attacks, in their simplest form, are you impersonating something else in order to get in the middle of that conversation or all the conversations if you impersonate the default gateway.
To accomplish this task, we will be performing ARP spoofing. This will allow us to tell the host to send its traffic to us as the default gateway and to tell the default gateway to send traffic to that host to us. This way, we can place ourselves in the middle of that conversation. Once we are in the middle of that conversation, we can not only learn...