![]() ![]() In the following screenshot, we can see that we have the gateway at 10.0.0.1, and the MAC address ends with 49-df: ![]() Now, run arp -a on the Windows machine to see our MAC address. If we do ifconfig just to see our interface, we'll see that we have the wlan0 card connected to the internet network at 10.0.0.11: We can use Ethernet virtual card instead of Wi-Fi card. We are going to be using our Wi-Fi card to do these attacks. In this section, we are going to use a basic ARP poisoning attack, exactly like we did in the previous section. This tool allows us to run a number of MITM attacks. In this section, we are going to talk about a tool called MITMf (man-in-the-middle framework).
0 Comments
Leave a Reply. |