Search for question
Question

ARP/MAC attacks

Task 1

Use arpspoof to target your pfsense router. Use urlsnarf to determine when the attack

has been successful. You should submit the following

1. A screenshot showing urlsnarf is picking up intercepted traffic

2. A screenshot showing the before and after ARP tables on your pfsense VM. Use the

arp command to obtain this information.

Task 2

Use macof to launch a CAM table flooding attack. You should submit the following. 1. A

screenshot showing macof in action.

Oracle VM VirtualBox Manager

File Machine Help

Tools

pfsense2

Powered Off

Metasploitable

2.6 Powered Off

Kali2020

Powered Off

XP

xp Powered Off

New Add

Preview

General

Settings Discard Start

Name:

Kali2020

Operating System: Debian (64-bit)

System

Base Memory:

Boot Order:

Acceleration:

8762 MB

Floppy, Optical, Hard Disk

Nested Paging, KVM Paravirtualization

Display

Video Memory:

Graphics Controller:

Remote Desktop Server:

Recording:

16 MB

VMSVGA

Disabled

Disabled

Storage

Controller: IDE

IDE Secondary Device 0: [Optical Drive] Empty

Controller: SATA

SATA Port 0:

Kali2020-disk001.vdi (Normal, 33.12 GB)

Fig: 1