I have to think about cause and consequence so defense is really the best offense.
I am wondering... (theoretically) by spoofing computer x and by capturing its packets and data being sent (in and out to computer x)... can i (for example) capture a word document (.doc)... that computer Y has sent to the computer x?
asked 02 May '14, 07:19
You need to be able to capture the packets in the first place, so your point of capture needs to be somewhere where the packets pass by. If you can achieve that, and the documents are not transferred over an encrypted link, then you can extract them from the capture.
Problem with spoofing is that usually the answer packets do not make it back to you but get sent to the real computer instead, so it won't help you.
answered 02 May '14, 07:21