Utilizing the ARP spoofing script we wrote in the previous post, we'll do some quick refactoring and then expand it to also intercept DNS requests so we can redirect the target to our own evil domain.
Man-in-the-middle network traffic to spy, and play with it. In this post, we'll go through the steps of creating our own basic ARP spoofer using Python, and the scapy library.
I attended PyCascades 2018 in Vancouver. Here are my top 3 (4 actually) talks.