Tagged articles
7 articles
Page 1 of 1
Ops Development Stories
Ops Development Stories
Aug 18, 2021 · Information Security

How to Extract IPs from PCAP and Perform Common Network Attacks with Scapy

This guide demonstrates how to use Python's Scapy library to extract IP addresses from PCAP files, sniff usernames and passwords from mail traffic, discover live hosts via SYN packets, launch MAC address table flooding attacks, and conduct ARP spoofing for man‑in‑the‑middle attacks, providing complete code examples.

ARP spoofingMAC FloodMITM
0 likes · 7 min read
How to Extract IPs from PCAP and Perform Common Network Attacks with Scapy
Ops Development Stories
Ops Development Stories
Apr 22, 2019 · Information Security

How MAC Flooding and ARP Spoofing Attacks Work—and How to Defend Them

This article explains the MAC learning and aging processes, demonstrates MAC flooding and ARP spoofing attacks with practical test setups, and provides step‑by‑step configurations such as port security, access management, and DHCP snooping to protect network switches from these threats.

ARP spoofingAccess ManagementDHCP snooping
0 likes · 10 min read
How MAC Flooding and ARP Spoofing Attacks Work—and How to Defend Them
Baidu Tech Salon
Baidu Tech Salon
Apr 14, 2014 · Information Security

Unmasking Modern Traffic Hijacking: Router, Wi‑Fi and LAN Attack Techniques

The article provides a comprehensive overview of traffic hijacking methods—from legacy hub sniffing and MAC spoofing to DNS poisoning, router CSRF, PPPoE phishing, and Wi‑Fi hotspot attacks—explaining how each works, real‑world examples, and practical mitigation steps for network administrators.

ARP spoofingTraffic HijackingWiFi phishing
0 likes · 32 min read
Unmasking Modern Traffic Hijacking: Router, Wi‑Fi and LAN Attack Techniques