MITM based on ARP spoofing
I fail to understand how a MITM attack sniffs packets and modifies them.In the case of ARP spoofing although the attacker has spoofed the MAC address of a host, how does he modify it?
if he listen to the message between the … Continue reading MITM based on ARP spoofing