In this lab we experiment with network attacks and, in particular, with interception.
Exploiting network vulnerabilities is an offensive technique. Trying it on real systems is against law and you might be prosecuted. Always do experiments with test hosts and users.
- Prerequisites
- Task 1: Address Resolution Protocol
- Task 2: ARP spoofing
- Task 3: interception
- Task 4: HTTP(S) interception