ARP Poisoning Lab
Understanding the functionality of basic Linux systems and the ease with which network attacks can be performed provides students with a foundational understanding of network security and its importance.
Part 1:
Complete the following:
·Conduct a MAC spoof and provide a screenshot.
·Conduct an ARP poisoning attack, change your MAC address, and provide a screenshot of the MAC address change command functioning.
·Provide screenshots of the Windows ARP table, highlighting the MAC address of the router and Kali Machine, the ARP spoofing command actively working, and the changed ARP address highlighting the duplicated MAC address.
Part 2:
Write a summary addressing the following:
·Provide your current MAC address and your IP address.
·Provide the name and IP address of a website (not GCU.edu).
·Define a MAC address, ARP, DNS, and spoofing in your own words.
·Explain why conducting an attack on your roommate or place of work without their permission is illegal or unethical.
·Explain why conducting an ARP attack on your virtual machine is legal.
·Identify the sniffing, spoofing, and session hijacking components of an ARP poisoning attack.
Place all screenshots in a Microsoft Word
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.