Simulating an ARP Spoofing Attack

An ARP spoofing attack (ARP poisoning) occurs when an attacker sends fake Address Resolution Protocol (ARP) messages on a local network to associate their own MAC address with the IP address of a legitimate device. This 'poisons' the ARP cache of other devices, tricking them into sending their network traffic to the attacker instead of the intended recipient. The attacker can then intercept, alter, or block this traffic, often leading to man-in-the-middle (MITM) attacks, session hijacking, or denial-of-service (DoS) attacks.

Simulating an ARP Spoofing Attack

Lab Topology

The lab topology consists of three main components: a victim machine running a standard Windows 10 OS, an attacker machine running Kali Linux, and a gateway/router running pfsense that both machines connect to. The attacker uses ARP spoofing to position themselves between the victim and the gateway, intercepting all traffic that flows between them. This man-in-the-middle position allows the attacker to capture sensitive data, modify packets, or perform other malicious activities without the victim's knowledge.

Network Configuration

Virtual Switch:     VMnet 2 (Host-Only)
Subnet:     192.168.10.0/24
All machines are connected to this isolated virtual switch to prevent traffic from escaping to the public internet.

Lab Components

    Gateway: pfSense
       IP = 192.168.10.1

    Attacker: Kali Linux
       IP = 192.168.10.100

    Victim: Windows 10
       IP = 192.168.10.101

Normal Topology

Normal Traffic Movement

Attack Topology

Traffic Movement after ARP Poisoning

Hardware Requirements

Minimum Hardware Requirements

    CPU: 4 physical cores / 8 threads with virtualization support enabled (Ideally 6+ physical /12+ threads)

    Follow this video to check if virtualization is enabled/disabled and how to enable it Here

    RAM: 12 GB (Ideally 16 GB)

    Storage: 120 GB free (Ideally SSD for faster load times)

    Host OS: 64-bit Windows or Linux host capable of running VMware Workstation Pro 25H2

My Hardware

    CPU: 8 physical cores / 16 threads with virtualization support enabled

    RAM: 32 GB

    Storage: 140 GB free SSD

    Host OS: Windows 11 Pro Version 25H2 (64-bit)

Computer Hardware
1
Prepare the Virtualization Environment

Download VMware

  1. Great Job! You have successfully installed VMware Workstation Pro!

Video Tutorial:

Configure VMware

2
Setup the Gateway

Download pfSense

Setup pfSense Virtual Machine

Initial pfSense LAN Configuration

3
Setup the Attacker

Download Kali Linux

Configure Kali Linux VM

4
Finalizing Gateway Setup

Login to pfSense webConfigurator

Change webConfigurator Traffic Protocol

5
Setup the Victim

Download Windows 10

Setup Windows 10 in VMware

Windows 10 Account Setup

6
Launch the Attack

Prepare the Attack Environment

Execute ARP Spoofing

7
Create The Bait

Access webConfigurator on the Victim

8
Analyze the Traffic

Filter Captured Packets

Extract Login Credentials

9
Next Steps

Revert Attacker Settings

Defensive Countermeasures

  1. Understanding the Attack
10
Troubleshooting

Verify VMware

Verify pfSense VM

Verify Kali Linux VM

Verify Windows 10 VM