<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacking on Teddy Ferdinand</title><link>https://tferdinand.net/en/tags/hacking/</link><description>Recent content in Hacking on Teddy Ferdinand</description><generator>Hugo</generator><language>en-US</language><lastBuildDate>Fri, 21 Oct 2022 07:12:13 +0000</lastBuildDate><atom:link href="https://tferdinand.net/en/tags/hacking/index.xml" rel="self" type="application/rss+xml"/><item><title>Attack techniques: understanding ARP poisoning</title><link>https://tferdinand.net/en/attack-techniques-understanding-arp-poisoning/</link><pubDate>Fri, 21 Oct 2022 05:37:16 +0000</pubDate><guid>https://tferdinand.net/en/attack-techniques-understanding-arp-poisoning/</guid><description>&lt;h4 id="disclaimer"&gt;Disclaimer&lt;/h4&gt;
&lt;p&gt;As often on this kind of post, I would like to remind you that the content you will find here is for educational purposes only.&lt;/p&gt;
&lt;p&gt;Unauthorized intrusion in an information system is punishable by fine and/or imprisonment.&lt;/p&gt;
&lt;p&gt;Understanding attacks means knowing how to avoid them. In this post, I propose you see a common network attack model: ARP poisoning.&lt;/p&gt;
&lt;h2 id="what-is-arp"&gt;What is ARP?&lt;/h2&gt;
&lt;p&gt;To understand the attack, we must already understand what it is based on.&lt;/p&gt;</description></item></channel></rss>