ARP spoofing, session hijacking, and data hijacking tools, scripts, and techniques
We now have an in-depth understanding of packets, packet filtering, and writing simple packets. In this section, we will try to understand malformed packets by learning about various network-level attacks, such as session or data hijacking via ARP poisoning. But before deep-diving into ARP poisoning, let’s understand the ARP protocol and analyze packets on the network level by capturing real-time traffic using Wireshark.
ARP protocol
The ARP protocol, as the name suggests, resolves or maps addresses. Now, the question is, which addresses? ARP maps the Media Access Control (MAC) addresses to IP addresses. Hence, the ARP protocol works on Layer-2 of the OSI model.
But how does this work? Now, we know that in a network, systems identify each other via IP addresses, but MAC addresses are required in real time to communicate with each other. Hence, it is the responsibility of the ARP protocol...