undergroundwires / CEH-in-bullet-points

💻 Certified ethical hacker summary in bullet points
https://cloudarchitecture.io/hacking
Creative Commons Attribution 4.0 International
995 stars 287 forks source link

ARP poisoning attack steps #8

Closed EnjoyTheJoke closed 3 years ago

EnjoyTheJoke commented 3 years ago

I think in the line "e.g. through host discovery using nmap e.g. nmap -sn 192.168.0.0" the Nmap scan is missing /16

undergroundwires commented 3 years ago

Great suggestion @EnjoyTheJoke ! I updated the example as you suggested, also improved target specification and host discovery explanations for better understanding.