In an internal penetration testing scenario, you aim to divert the flow of packets from a target device to your testing system to inspect and potentially modify the data. This will be achieved by sending fabricated messages to the network's devices. Which technique should be used to convince the network that your system is the intended recipient for the target device's traffic?
DNS cache poisoning
Denial-of-Service (DoS) attack
Spoofing a network address
ARP poisoning