In the man-in-the-middle attack, we placed ourself between the victim and their destination by using a method called ARP poisoning. We corrupted the MAC-to-IP traffic so we were able to capture the victims traffic.
In the man-in-the-middle attack, we placed ourself between the victim and their destination by using a method called ARP poisoning. We corrupted the MAC-to-IP traffic so we were able to capture the victims traffic.