ARP Spoofing

This document highlights the threats which exists on Local Network if the network is not handling ARP Spoofing request. The Activities which can be performed by a malicious user through ARP spoofing attack are:

  • Captures network Traffic over the LAN network

  • Able to Steal sensitive information of Victim including (Username, Passwords, Account No) etc.

  • The Major activity which can be performed through this attack is, by continuously sending ARP spoofing request an attacker can intrupt the network performance easily.
  • .