September 2021
Intermediate to advanced
376 pages
9h 25m
English
Pay no attention to the man behind the curtain!
–Noel Langley, The Wizard of Oz

Anyone who walks into a coffee shop and connects to its Wi-Fi network can intercept and view other users’ unencrypted web traffic using a technique called ARP spoofing, which exploits a vulnerability in the design of the address resolution protocol (ARP). In this chapter, we explain how ARP works, describe the steps of an ARP spoofing attack, and then perform one ourselves.
Before we can discuss ARP spoofing, we must first understand the internet’s general structure. This section describes how the ...