During a penetration test, you observe that a network device is continuously broadcasting requests to identify the hardware address corresponding to a known network address. Seeking to intercept and alter the communication between this device and another server within the same broadcast domain, which method would be most suitable for inserting yourself into their communication stream?
Flooding the network with traffic to prevent legitimate communications from occurring
Deploying an unauthorized DHCP server to reroute traffic through your machine
Capturing packets passively to analyze traffic without sending any of your own
Introducing forged address resolution protocol responses to bind your hardware address with the server's network address