[cs615asa] Red Team Link Week 6

Yuchen Zeng yzeng10 at stevens.edu
Mon Mar 4 16:15:02 EST 2019


Hello everyone

We find something about Arp Spoofing.

https://medium.com/secjuice/man-in-the-middle-attack-using-arp-spoofing-fa13af4f4633

[https://cdn-images-1.medium.com/max/1200/1*9LUTtlCs97lmoYjmQeZtTA.png]<https://medium.com/secjuice/man-in-the-middle-attack-using-arp-spoofing-fa13af4f4633>

How To Do A Man-in-the-Middle Attack Using ARP Spoofing & Poisoning<https://medium.com/secjuice/man-in-the-middle-attack-using-arp-spoofing-fa13af4f4633>
medium.com
The following article is going to show the execution of “Man in the Middle (MITM)” attack, using ARP Poisoning. There are tons of articles…


About my experience, I think it might be hard to use that tech to attack some far away from you. But it is useful and easy to attack someone who is in the same local network with you. It is especially useful when you control the Router which is share with all your roommate. It is illegal to do something harmful. But I think it if a good way to play a joke on some body or give your girlfriend a surprised.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.stevens.edu/pipermail/cs615asa/attachments/20190304/e304a334/attachment-0001.html>


More information about the cs615asa mailing list