An unlicensed copy of Windows XP and 7 will work for this exercise in order to demonstrate ARP Poisoning and the Main-in-the-Middle Attack. We will be using Windows XP and/or Windows 7 for both victim workstation VM's and as the attacker. By doing so, we are able to replicate an actual Ethernet LAN that we are able to conduct our lab in. In this task, we will setup two virtual machines using Virtual Box. Module 1 – Setup lab and conduct initial ARP Poisoning ![]() With this type of attack we can set up a Man-in-the-Middle exploit which allows us to sniff traffic between two or more workstations and capture sensitive information such as credentials. In this course, we will conduct an Arp Poisoning/Spoofing attack using Cain and Abel. ![]() This was part of the ARP poisoning attack we were studying in the course, but you can apply these skills in all kinds of scenarios. In this video from our ARP Poisoning course we take a look at how we can use Wireshark to capture credentials.
0 Comments
Leave a Reply. |