a tool for performing man-in-the-middle attacks, redirecting traffic via ARP poisoning and DNS spoofing, detection of hosts on the LAN, detection of network traffic, as well as tools to inspect intercepted traffic.
a tool for performing man-in-the-middle attacks, redirecting traffic via ARP poisoning and DNS spoofing, detection of hosts on the LAN, detection of network traffic, as well as tools to inspect intercepted traffic.