Figure 3-4. SSH session captured by a packet sniffer
Figure 3-6. Warning message the victim sees once she connects to the SSH server, explaining that she previously connected to the SSH server and will receive a security host key mismatch warning from her SSH client
Figure 3-5. Attacker selecting the gateway and all the hosts on the adjacent network
In the case of the victim using an SSH client such as PuTTy, all that stands between the attacker intercepting valid credentials on the server is the victim clicking Yes in the dialog box shown in Figure 3-6. When the victim clicks Yes, she accepts the attacker’s Abusing ARP | 83