Lab Experiment > Laboratory Exercise5– IP and MAC Spoofing


George Mason University CYSE 230 Laboratory Exercise 5 – IP and MAC Spoofing   1. Overview   For this lesson, students will use the Cyber Range: Kali Linux with Metasploitable (2018) environment to   complete IP spoofing, MAC spoofing. Students will also use the Kali and Vulnerable Windows (64bit) VMs   environment to complete and examine a MITM ...[Show More]

Preview 1 out of 7 pages
Purchase this document to unlock the blurred part and the rest of the document

Unlock Now

Reviews( 0 )