Question: 4 . 3 Task 2 . 3 : Sniff and then Spoof In this task, you will combine the sniffing and spoofing techniques to implement

4.3 Task 2.3: Sniff and then Spoof
In this task, you will combine the sniffing and spoofing techniques to implement the following sniff-and-
then-spoof program. You need two machines on the same LAN. From machine A, you ping an IP X. This will
generate an ICMP echo request packet. If x is alive, the ping program will receive an echo reply, and print out
the response. Your sniff-and-then-spoof program runs on the attacker machine, which monitors the LAN
through packet sniffing. Whenever it sees an ICMP echo request, regardless of what the target IP address is,
your program should immediately send out an echo reply using the packet spoofing technique. Therefore,
regardless of whether machine x is alive or not, the ping program will always receive a reply, indicating that x
is alive. You need to write such a program in C, and include screenshots in your report to show that your
program works. Please also attach the code (with adequate amount of comments) in your report. please write a perfect code for this that shows sniffing then spoffing perfetly and also satisfies above criteria
4 . 3 Task 2 . 3 : Sniff and then Spoof In this

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!