Introduction - If you have any usage issues, please Google them yourself
ARP spoofing attack program. Hacker sends fake ARP Reply told A, Computer B' s MAC address is the MAC address of a computer Hacker. Hacker sends fake ARP Reply told B, computer A' s MAC address is the MAC address of a computer Hacker. This communication between A and B will go through Hacker, and then carried forward by the Hacker. Hacker can then capture all the data between A and B transmission (such as user name and password).