Our great sponsors
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
I'm implementing an ARP spoofing and man in the middle attack tool in C. For that I took the docker container config from Seed Labs. Here three containers are present: Host A (ip: 10.9.0.5, mac: 02:42:0a:09:00:05), Host B (ip: 10.9.0.6, mac: 02:42:0a:09:00:06), and Host M (ip: 10.9.0.105, mac: 02:42:0a:09:00:69). Host M is to be the attacker.
I programmed the ARP spoofing tool from this repository](https://github.com/SRJanel/arp_poisoning) and it works. If I open a netcat port at Host B and connect from Host A, then send something from Host A after running the spoofing tool, the message doesn't get through to Host B. I took a packet sniffer from here to check if the netcat packets are indeed being sent to Host M instead of Host B. And it shows the ARP spoofing is working. I checked with Wireshark, too.