The idea behind
I remember the times I've got my first hub in my hands. These days a managed switch was not affordable or even existing in my tiny world. Nowaday a network admin is unscrupulous using an unmanaged switch under the desk. Just every secretary could accidently make a loop and suddenly network is down in this room.
Again misconfiguration and bottlenecks in serial attached network switches is the worst case scenario. Admin did a good job already if the Spanning Tree Protocol is turned on and assistant can't lockdown the network with a loop. So best attacking vectors beside the hardware attacks are in this case standard password and ARP Request Poisoning.
Fighting against network ARP attacks with your switch is not a trivial task. I do have a good solution for this issue described in the defense section of this website - assuming the attacker is not one of your trusted company workstations.
The check
The scenario plays at home with my computer and the ipad of my wife. I just want to stop her downloading a file and using too much bandwidth of my internet connection. I'm using my linux box and do need only one package installed so in this case I don't start kali or parrot.
- MyIP : 192.168.1.234
- WifeIP: 192.168.1.120
- Gateway: 192.168.1.1
arpspoof -i enp0s12d6 -t 192.168.1.120 -r 192.168.1.1
Ask your wife if she is happy now with internet speed?
The conclusion
There is a massive amount of network attack vectors around so be careful allowing guests to plug and play. But in my opinion network attacks and especially arp spoofing is the best way for information gathering. Playing a Man in the Middle Attack allows you to sniff auth packages of your tested device. That's how I've shown a company not to use ftp for transmitting failure protocols of their software.