ARP Spoofing Lab
ARP poisoning (on-path) with arpspoof in Kali on a segmented LAN, with pre-attack Nmap recon and post-attack Wireshark analysis.
View this project on GitHub
Overview
This lab walks through an end-to-end attack path on a local network:
- Active reconnaissance with Nmap to identify the target and infer OS details.
- ARP spoofing with
arpspoof to position the attacker as on-path (man-in-the-middle).
- Traffic analysis in Wireshark to enumerate services and metadata (DNS, NetBIOS, SSDP, etc.).
Environment: Performed in a segmented lab LAN to avoid impacting production systems.
Active Reconnaissance with Nmap
Analyzing Captured Traffic with Wireshark
Identifying DNS Server IP Address
Extracting resolver IP from captured packets.
DNS enumeration details (queries/responses).
Additional resolver metadata.
NetBIOS and Other Host Information
SSDP Enumeration
UPnP/SSDP announcements observed on-path.
Device/service hints gleaned from SSDP.
Other Host Information
Miscellaneous metadata useful for follow-up enumeration.