Skip to content

Introduction

Spoofing modules enable Man-in-the-Middle (MITM) attacks on local networks.

A man-in-the-middle attack (MITM) intercepts communication between two parties. The attacker secretly relays and can alter messages. Both parties believe they are communicating directly with each other.

The attack follows a simple pattern:

  1. Position: The attacker places themselves between victim and destination
  2. Intercept: All traffic flows through the attacker’s machine
  3. Relay: Messages are forwarded, optionally modified

When you connect to a network, the router forwards your packets to their destination.

In a MITM attack, we spoof the router’s address. The network then considers our device as the router.

mitm

Once positioned, all network traffic flows through your computer. This enables:

  • Sniffing: Capture emails, passwords, cookies
  • Proxying: Intercept and modify HTTP/HTTPS requests
  • Injection: Replace content, kill connections, redirect traffic
ModuleProtocolDescription
arp.spoofARP/IPv4Spoof ARP replies to intercept IPv4 traffic
ndp.spoofNDP/IPv6Spoof neighbor advertisements for IPv6 networks
dns.spoofDNSReply to DNS queries with spoofed responses
dhcp6.spoofDHCPv6Attack Windows hosts via DHCPv6 responses