ARP and DNS Attack Simulation and Mitigation

Evani

Evani Raut

ARP-DNS-Attack-Demo

Project Overview

This project explores the execution and impact of ARP and DNS spoofing attacks in a simulated lab environment using Kali Linux and Windows 7 VMs on Oracle VirtualBox. It demonstrates how attackers can intercept and manipulate network traffic using spoofing techniques and evaluates countermeasures such as firewalls and ACLs. The goal is to raise awareness about network vulnerabilities and explore mitigation strategies in a safe, ethical, and academic context.

Objectives

Simulate ARP and DNS spoofing attacks in a home lab setup
Use tools like Bettercap and Apache2 for demonstration
Capture and analyze traffic from a victim device
Host a fake website and redirect victim via DNS spoofing
Evaluate firewall and ACL-based mitigation techniques
Document the technical process, risks, and defense mechanisms

Contents

Introduction to ARP and DNS spoofing
Problem statement, aims, and objectives
Background and current cybersecurity relevance
Step-by-step attack setup and execution
Mitigation strategies (Firewall & ACL)
Evaluation (Pros, Cons, Cost-Benefit)
Conclusion and references
Complete screenshots and explanation of tools used

Files in this Repo

23047459-GroupEvaniRaut.pdf — Full project report with explanation, screenshots, and evaluations

Key Learnings

Practical understanding of ARP and DNS spoofing techniques
Use of penetration testing tools like Bettercap
Traffic interception and spoofed web hosting using Apache2
Network defense using firewalls and ACLs
Project documentation, evaluation, and ethical analysis
Like this project

Posted Jul 19, 2025

Simulated ARP and DNS attacks to explore network vulnerabilities and defenses.