1. Setting Up the Testing Environment

Objective: Install and configure the necessary tools to perform MITM (Man-In-The-Middle) attacks.

Steps:

  1. Install Kali Linux on your system or as a virtual machine.

  2. Ensure tools like arpspoof and Yersinia are installed. Use the following commands in the terminal:

    image.png

  3. Test the installation by running the tools to confirm they are functional.


2. Identifying Devices in the Network

Objective: Use arp-scan to identify devices connected to the network.

1.png


3. Launching an ARP Spoofing Attack with arpspoof

Objective: Intercept traffic between two devices using ARP Spoofing.

image.png

WhatsApp Image 2025-01-17 at 15.33.20_a858dbd4.jpg


4. Capturing Packets with Wireshark

Objective: Analyze intercepted traffic using Wireshark.

image.png