Concept Flow - ARP spoofing
Attacker sends fake ARP reply
Victim updates ARP cache with wrong MAC
Victim sends data to attacker instead of real device
Attacker can intercept or modify data
Attacker may forward data to real device to avoid detection
The attacker sends false ARP messages to a victim, causing the victim to associate the attacker's MAC address with a legitimate IP address, redirecting traffic through the attacker.