3. T1 IP:10.0.0.1 MAC:aa:aa:aa:aa T2 IP:10.0.0.2 MAC:bb:bb:bb:bb Hacker IP:10.0.0.3 MAC:cc:cc:cc:cc switch ARP cache ARP cache IP MAC 10.0.0.2 bb:bb:bb:bb IP MAC 10.0.0.1 aa:aa:aa:aa ARP reply falso IP:10.0.0.2 MAC:cc:cc:cc:cc ARP reply falso IP:10.0.0.2 MAC:cc:cc:cc:cc ARP reply falso IP:10.0.0.2 MAC:cc:cc:cc:cc
4. T1 IP:10.0.0.1 MAC:aa:aa:aa:aa T2 IP:10.0.0.2 MAC:bb:bb:bb:bb Hacker IP:10.0.0.3 MAC:cc:cc:cc:cc switch ARP cache ARP cache La cache de T1 fue envenenada. IP MAC 10.0.0.2 cc:cc:cc:cc IP MAC 10.0.0.1 aa:aa:aa:aa
5. T1 IP:10.0.0.1 MAC:aa:aa:aa:aa T2 IP:10.0.0.2 MAC:bb:bb:bb:bb Hacker IP:10.0.0.3 MAC:cc:cc:cc:cc switch ARP cache ARP cache IP MAC 10.0.0.2 cc:cc:cc:cc IP MAC 10.0.0.1 aa:aa:aa:aa ARP replies falsas IP:10.0.0.1 MAC:cc:cc:cc:cc ARP replies falsas IP:10.0.0.1 MAC:cc:cc:cc:cc
6. T1 IP:10.0.0.1 MAC:aa:aa:aa:aa T2 IP:10.0.0.2 MAC:bb:bb:bb:bb Hacker IP:10.0.0.3 MAC:cc:cc:cc:cc switch ARP cache ARP cache La cache de T2 fue envenenada. IP MAC 10.0.0.2 cc:cc:cc:cc IP MAC 10.0.0.1 cc:cc:cc:cc
7. T1 IP:10.0.0.1 MAC:aa:aa:aa:aa T2 IP:10.0.0.2 MAC:bb:bb:bb:bb Hacker IP:10.0.0.3 MAC:cc:cc:cc:cc switch ARP cache ARP cache Mensaje que debería haber ido a T2 El Hacker hará el envio del mensaje IP MAC 10.0.0.2 cc:cc:cc:cc IP MAC 10.0.0.1 cc:cc:cc:cc
8. T1 IP:10.0.0.1 MAC:aa:aa:aa:aa T2 IP:10.0.0.2 MAC:bb:bb:bb:bb Hacker IP:10.0.0.3 MAC:cc:cc:cc:cc switch ARP cache ARP cache El hacker hará el envio del mensaje Mensaje que debería ir a T1 IP MAC 10.0.0.2 cc:cc:cc:cc IP MAC 10.0.0.1 cc:cc:cc:cc