HOW DOES ARP SPOOFING ATTACK WORKS :-
The Address Resolution Protocol (ARP) is a widely used communications protocol for resolving Internet layer addresses into link layer addresses.
When an Internet Protocol (IP) datagram is sent from one host to another in a local area network, the destination IP address must be resolved to a MAC address for transmission via the data link layer.
When another host's IP address is known, and its MAC address is needed, a broadcast packet is sent out on the local network. This packet is known as an ARP request. The destination machine with the IP in the ARP request then responds with an ARP reply that contains the MAC address for that IP.
![ARP spoofing](tutorials/how_arp.jpg)
ARP spoofing attacks typically follow a progression approach. The steps to an ARP spoofing attack usually include:
Examples of popular ARP spoofing softwareinclude Arpspoof, Cain & Abel, Arpoison and Ettercap.