This attack is one of the most common and famous attack in the cybersecurity area and sometimes it is known by MITM attack. In this attack, the attacker behaves just as a proxy by spoofing both the sender and receiver on a network. This attack can only be launched in Local Area Network and can even result in destroying that network.