![]() The victim-machine can also be a windows machine. One with a kali linux installation(attacker) and another one with debian running(victim). So the Setup we use here is the following: We are going to tell Machine A(the target) that we are machine C(the router) and route the packets for Machine A to C(and vice versa) through us so that we can capture these packets. In this part we‘ll have a look at packet-capturing and ARP-Spoofing.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |