Objective: Install and configure the necessary tools to perform MITM (Man-In-The-Middle) attacks.
Steps:
Install Kali Linux on your system or as a virtual machine.
Ensure tools like arpspoof and Yersinia are installed. Use the following commands in the terminal:

Test the installation by running the tools to confirm they are functional.
Objective: Use arp-scan to identify devices connected to the network.

Objective: Intercept traffic between two devices using ARP Spoofing.


Objective: Analyze intercepted traffic using Wireshark.
