<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Arp on kubelize</title><link>https://test.kubelize.com/tags/arp/</link><description>Recent content in Arp on kubelize</description><generator>Hugo</generator><language>en</language><lastBuildDate>Fri, 17 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://test.kubelize.com/tags/arp/index.xml" rel="self" type="application/rss+xml"/><item><title>MITM attack using Ettercap</title><link>https://test.kubelize.com/blog/2026/04/mitm-attack-using-ettercap/</link><pubDate>Fri, 17 Apr 2026 00:00:00 +0000</pubDate><guid>https://test.kubelize.com/blog/2026/04/mitm-attack-using-ettercap/</guid><description>&lt;p&gt;&lt;img src="ettercap-logo.png" alt="alt text"&gt;&lt;/p&gt;
&lt;p&gt;Ettercap is a MITM (Man-in-the-Middle) attack suite with a wide range of plugins supporting different attack techniques. This article focuses on a simple ARP poisoning and DNS hijacking attack. For this to work, the involved devices must share Layer 2 connectivity.&lt;/p&gt;
&lt;p&gt;Credit: &lt;a href="https://www.ettercap-project.org/"&gt;The Ettercap Project&lt;/a&gt;&lt;/p&gt;
&lt;div class="callout callout-warning"&gt;
 &lt;div class="callout-title"&gt;
 &lt;svg viewBox="0 0 16 16" width="16" height="16" fill="currentColor"&gt;&lt;path d="M6.457 1.047c.659-1.234 2.427-1.234 3.086 0l6.082 11.378A1.75 1.75 0 0 1 14.082 15H1.918a1.75 1.75 0 0 1-1.543-2.575Zm1.763.707a.25.25 0 0 0-.44 0L1.698 13.132a.25.25 0 0 0 .22.368h12.164a.25.25 0 0 0 .22-.368Zm.53 3.996v2.5a.75.75 0 0 1-1.5 0v-2.5a.75.75 0 0 1 1.5 0ZM9 11a1 1 0 1 1-2 0 1 1 0 0 1 2 0Z"/&gt;&lt;/svg&gt;
 &lt;span&gt;Warning&lt;/span&gt;
 &lt;/div&gt;
 &lt;div class="callout-content"&gt;This article is for &lt;strong&gt;educational purposes only&lt;/strong&gt;. Performing MITM attacks on networks without explicit authorization is illegal and unethical. Only practice these techniques in controlled lab environments that you own or have permission to test.&lt;/div&gt;
&lt;/div&gt;

&lt;h2 id="the-man-in-the-middle-attack"&gt;The Man-in-the-Middle attack&lt;/h2&gt;
&lt;p&gt;The principle of a MITM attack is to insert an attacker into a network or communication path and make the targets believe that it is part of the regular communication relay. There are several different methods to achieve this &amp;ldquo;trusted imposter&amp;rdquo; status, many of which are available as plugins in ettercap. This article focuses on two such methods: ARP poisoning and DNS highjacking.&lt;/p&gt;</description></item></channel></rss>