You are the IT security administrator for a small corporate network. You believe a hacker has penetrated your network and is using ARP poisoning to infiltrate it.
In this lab, your task is to discover whether ARP poisoning is taking place as follows:(image)