By the end of this section, you will be able to:
● Understand ARP spoofing and its role in MITM attacks.
● Use Kali-Attacker to poison ARP tables of Web-SRV2 and the Edge router.
● Intercept and analyze traffic between the victim and gateway.
● Learn how to detect and mitigate ARP spoofing attacks.
In this exercise, you will:
● Use tools like arpspoof, ettercap, or Bettercap on Kali-Attacker.
● Send forged ARP replies to:
1. Web-SRV2, mapping the Edge router’s IP to Kali’s MAC.
2. Edge router, mapping Web-SRV2’s IP to Kali’s MAC.
● Understand how ARP spoofing enables packet interception and manipulation.