Description: ARP spoofing attack program. Hacker sends fake ARP Reply told A, Computer B' s MAC address is the MAC address of a computer Hacker. Hacker sends fake ARP Reply told B, computer A' s MAC address is the MAC address of a computer Hacker. This communication between A and B will go through Hacker, and then carried forward by the Hacker. Hacker can then capture all the data between A and B transmission (such as user name and password).
File list (Check if you may need any files):
ARPSpoof.opt
ARPSpoof.plg
Debug\vc60.idb
.....\vc60.pdb
ARPSpoof.cpp
ARPSpoof.dsp
ARPSpoof.dsw
ARPSpoof.ncb
Debug