The document discusses various cybersecurity topics including ARP spoofing, social engineering, and network exploitation exercises. It provides links to resources about ARP protocol, how ARP maps IP addresses to MAC addresses, social engineering techniques using human weaknesses, and the Net2 exploitation exercise on a protostar network. The document suggests methods for building phishing websites quickly and issues to watch out for when using some website UIs.
5. 1/2/2021 4
? Address Resolution Protocol
? ARP ɫ IP DQ MAC
https://ithelp.ithome.com.tw/articles/10246385?sc=hot
PC A 10.10.10.1 AA:AA:AA:AA:AA:AA
PC B 10.10.10.2 BB:BB:BB:BB:BB:BB
PC C 10.10.10.3 CC:CC:CC:CC:CC:CC