✔️ Configure a Kali machine to perform ARP Poisoning against Windows and Linux machine
✔️ Use Wireshark to analyze intercepted traffic to find sensitive information and files
we should always remember to enable IP Forwarding before ARP spoofing so that we don't :
$ echo 1 > /proc/sys/net/ipv4/ip_forward
$ arpspoof -i <interface> -t <target> -r <host>
once any requests and responses are sent between the client and the server...
run wireshark
whenever a client opens a file in the server/ share,
it is downloaded and opened for read/write on the go
open the captured traffic,