CompTIA PenTest+ PT0-002 Practice Question
During a penetration test, you observe that a network device is continuously broadcasting requests to identify the hardware address corresponding to a known network address. Seeking to intercept and alter the communication between this device and another server within the same broadcast domain, which method would be most suitable for inserting yourself into their communication stream?
Deploying an unauthorized DHCP server to reroute traffic through your machine
Introducing forged address resolution protocol responses to bind your hardware address with the server's network address
Capturing packets passively to analyze traffic without sending any of your own
Flooding the network with traffic to prevent legitimate communications from occurring