Skip to Content
Ethical Hacking
book

Ethical Hacking

by Daniel G. Graham
September 2021
Intermediate to advanced
376 pages
9h 25m
English
No Starch Press
Content preview from Ethical Hacking

2CAPTURING TRAFFIC WITH ARP SPOOFING

Pay no attention to the man behind the curtain!

–Noel Langley, The Wizard of Oz

image

Anyone who walks into a coffee shop and connects to its Wi-Fi network can intercept and view other users’ unencrypted web traffic using a technique called ARP spoofing, which exploits a vulnerability in the design of the address resolution protocol (ARP). In this chapter, we explain how ARP works, describe the steps of an ARP spoofing attack, and then perform one ourselves.

How the Internet Transmits Data

Before we can discuss ARP spoofing, we must first understand the internet’s general structure. This section describes how the ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide

Rafay Baloch
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition, 6th Edition

Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost
Hands on Hacking

Hands on Hacking

Matthew Hickey, Jennifer Arcuri

Publisher Resources

ISBN: 9781098129095Errata Page