Does the attacker have to poison the gateway's ARP tables too? Why?

Does the attacker have to poison the gateway's ARP tables too? Why?



Yes, after the attacker has successfully rerouted the host traffic, it needs to reroute the traffic coming to, and from, the gateway. It uses a similarly spoofed ARP reply to poison the gateway. The attacker sends a continuous stream of spoofed ARP replies to the gateway, telling it that all other internal hosts are at C3-C3-C3-C3-C3-C3 (Step 3).


Learn More :

Learn More Multiple Choice Question :