This is my first blog, write bad please understand
____________________________ (split line) _______________________________
In the Kali Linux system, there is an ARP artifact called "Arpspoof" in the self-contained tool, not much nonsense, directly to get started
This lab environment is an ARP middleman between target drone and FTP servers.
Target drone ip:10.90.100.53 mac:04:69:f8:db:75:6b
Middleman Kali ip:10.90.100.242 mac:00:0c:29:a7:16:35
FTP Server ip:10.90.100.68 mac:00:0c:29:bb:44:56
Experimental network topology diagram
First step: Echo 1 >/proc/sys/net/ipv4/ip_forward
Kali Turn on forwarding function
Step two: The MAC address of the FTP server in the target drone ARP table before the ARP attack
Step three: Realize two-way spoofing with Arpspoof
Fourth step: On the target drone View the FTP server MAC address to verify that spoofing is successful
Fifth step: Use the tool tcpdump to listen to the FTP port 21 port and import the intercepted packets into the 1.txt (if there is no 1.txt, then automatically new)
Tcpdump-nn-x-i eth0 TCP prot > 1.txt
Sixth step : view the packet and find useful information
ARP attack under Kali Linux