Task 1
Use arpspoof to target your pfsense router. Use urlsnarf to determine when the attack
has been successful. You should submit the following
1. A screenshot showing urlsnarf is picking up intercepted traffic
2. A screenshot showing the before and after ARP tables on your pfsense VM. Use the
arp command to obtain this information.
Task 2
Use macof to launch a CAM table flooding attack. You should submit the following. 1. A
screenshot showing macof in action.
Oracle VM VirtualBox Manager
File Machine Help
Tools
pfsense2
Powered Off
Metasploitable
2.6 Powered Off
Kali2020
Powered Off
XP
xp Powered Off
New Add
Preview
General
Settings Discard Start
Name:
Kali2020
Operating System: Debian (64-bit)
System
Base Memory:
Boot Order:
Acceleration:
8762 MB
Floppy, Optical, Hard Disk
Nested Paging, KVM Paravirtualization
Display
Video Memory:
Graphics Controller:
Remote Desktop Server:
Recording:
16 MB
VMSVGA
Disabled
Disabled
Storage
Controller: IDE
IDE Secondary Device 0: [Optical Drive] Empty
Controller: SATA
SATA Port 0:
Kali2020-disk001.vdi (Normal, 33.12 GB)
Fig: 1