I have tried to build an arp spoofing project that performs MITM attacks (for educational purposes only). I am using c++ raw sockets. When I tested it out, I sent the fake arp packets to the victims and I had noticed that my own arp table got affected. Why would the OS read outgoing packets ..
the code compiles correctly, but although I run the code with elevated privileges, I still have access denied. I run the program like this: runas.exe / user: "admin" FlushIpNetTable.exe OS: Windows 10 Version 10.0.10240 Does anyone have any suggestions why, despite the increased privileges, I cannot clean this table? 🙂 ? #include <winsock2.h> #include <iphlpapi.h> ..