Showing posts from February, 2021

WRITING A ARP SPOOFING/FOOLING

# When we send ARPP to the target computer we pretend to be the router and we tell the router that we are the target computer. # ARP RESPONSE POISON THE ARP TABLE  OF THE VICTIM AND MAKE US MAN IN MIDDLE���������…

MAC CHANGER ALGORITHMS DESIGN

# SIMPLE ALGORITHM Steps: Execute and read ifconfig read the mac address from the output check if MAC in ifconfig is what the user requested print appropriate message DOWNLOAD/VIEW # Why we put '#' /line 27 # change_mac(options.interface, op…

Load More
That is All