ARP Spoofing: Replying to requests meant for spoofed IP, while also being able to communicate with spoofed IP

I am simulating an ARP Spoofing attack on a local network. I have an Attacker machine on Linux, a web server, and a Victim machine which is trying to access the web server. I am successfully able to spoof the IP of the web server, and I am… Continue reading ARP Spoofing: Replying to requests meant for spoofed IP, while also being able to communicate with spoofed IP

I can’t find my switch’s ip by both ARP and ICMP protocols scan with nmap [closed]

My switch is a TP-Link TL-SG105E perfectly function, but I can’t access to it because it’s like hidden somehow from the network.

I used tools like:

netdiscover -I wlp2s0 -r 192.168.0.0/24
nmap -PR 192.168.1.0/24
nmap -SP 192.168.1.0/24… Continue reading I can’t find my switch’s ip by both ARP and ICMP protocols scan with nmap [closed]