This article goes into some technical details, but it’s a good example of how attacks can be made, in particular pharming attacks.
Do not try this at home….actually…that’s the only place you CAN try it, provided you’ve got everyone’s permission.
You to a parent> “Can I instruct the link layer to not discard packets in order to log activity and gain knowledge? It will help me learn.”
Parent> “Yeah, yeah, whatever.”