For testing purposes, I want to apply promiscuous mode in Wireshark to capture traffic not sent to me.
For this, I believe there is the need to poison the ARP table in the switch so that the attacker (me) gets all the requests.
Assume the switch used was a cheap commercial switch and the poisouning indeed took place and was not detected and the table was messed up.
Does this have any further consequences? Will the entire network (around 15 wired devices) have a lag to the internet or so? Can I put the table back to its place ?
I will carry the attack using Cain and Abel for Windows.
I repeat again, this will be done on my own network for testing purposes.
Update: As hinted by immibis, the switches do not have an ARP table but rather a Forwarding table. There is apparently a naming misconception going on, where ARP in its literally sense, happens inside the computer or the machine creating the frame, because it needs the MAC address of the target machine it needs to send the frame to.