Cybersecurity professionals must understand the details of how a man-in-the-middle attack works at the packet level. In this video, we will capture an ARP poisoning attack and analyze how it works with Wireshark.
In this video, I used VitualBox to host two VMs - a Windows 10 Machine and a Kali Linux machine. Ettercap (ettercap-project.org) was used to execute the MiTM, and Wireshark was used to analyze it. (www.wireshark.org)
Please comment below if you like this content, let me know what you think!
== More On-Demand Training from Chris ==
▶Getting Started with Wireshark - https://bit.ly/udemywireshark
▶Getting Started with Nmap - https://bit.ly/udemynmap
== Live Wireshark Training ==
▶TCP/IP Deep Dive Analysis with Wireshark - https://bit.ly/virtualwireshark
== Private Wireshark Training ==
Let's get in touch - https://packetpioneer.com/product/private-virtual-classroom/
Chapters:
0:00 Intro
0:44 Lab Setup / ARP Cache
2:50 How an ARP Attack works
5:09 MiTM with Ettercap
9:33 Analyzing the ARP Attack in Wireshark