·5 min read
ARP Spoofing / Poisoning: How It Works and How to Defend Against It
A deep dive into ARP spoofing attacks — how ARP works, the mechanics of poisoning a cache, and practical mitigation strategies with Scapy examples.
I write about cybersecurity, networking, and document my personal projects. Occasionally I share CTF writeups and security research notes.