Miley, a professional hacker, decided to attack a target organization's network. To perform the attack, she used a tool to send fake ARP messages over the target network to link her MAC address with the target system's IP address. By performing this, Miley received messages directed to the victim's MAC address and further used the tool to intercept steal, modify, and block sensitive communication to the target system.
What is the tool employed by Miley to perform the above attack?
tokramg
Highly Voted 1 year, 4 months agoDaniel8660
Most Recent 6 months, 2 weeks agoRoVasq3
1 year, 4 months ago