O'Reilly logo

BackTrack 4: Assuring Security by Penetration Testing by Shakeel Ali, Tedi Heriyanto

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Network spoofing tools

In the previous section, we talked about several tools that are used as network sniffer or network protocol analysis. In this section we will see several tools that can be used to do network spoofing.

Network spoofing is a process to modify network data, such as MAC address, IP address, and so on. The goal of this process is to be able to get the data from two communicating parties.

Arpspoof

Arpspoof is useful to sniff network traffic in a switch environment. In the previous chapter it is stated that sniffing network traffic in a switch environment is hard, but by using arpspoof, it is possible.

Arpspoof works by forging ARP replies to both communicating parties.

In a normal situation, when host A wants to communicate with ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required