Question
Sniffing and-then Spoofing. You will use two different VMs to sniff ping packets and then spoof a reply. Note 1: No ARP spoofing or other
Sniffing and-then Spoofing. You will use two different VMs to sniff ping packets and then spoof a reply. Note 1: No ARP spoofing or other Attacker-in-the-Middle (AITM) techniques are required. Note 2: if youre using VirtualBox, be sure to follow the instructions on Appendix B of the SEED Lab Setup Instructions to setup the network adaptor correctly. Special Instructions for VMWare Fusion: Please do everything on a single VM as one VM is not capturing traffic from the other VM. (If someone figures how to fix this in VMWare fusion, I will give bonus points.) To make it work, you must force scapy not to use the loopback interface with the following:
#!/usr/bin/python3
From scapy.all import * c
onf.L3socket = L3RawSocket
#rest of your code
(1) usiing pythonSubmit your scapy code for sniffing and then spoofing
(2) usiing pythonPing 8.8.8.8 and show screenshots of the output from your program and from ping (
3)using Ping 1.2.3.4 and show screenshots of the output from your program and from ping
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started