>>3915Do you know if the LAN is running IPV4, IPV6 or both? If it is at least running IPV4, and you have the wifi password, look into ARP spoofing, which can be used to spoof the default gateway to clients on a network. This can easily fuck up a network if you can get a computer on the network that can send the spoofed packets (ie connect your laptop to wifi)
ARP spoofing tricks clients on the network into resolving the LAN's gateway to another client instead of the actual gateway. All traffic destined out of the network is first sent to the gateway to send it out of the network, so ARP spoofing can be used to spy on a network and gain credentials (by having your computer stand in as the gateway and sniff all packets going to and from you and the outside server), or to stop all outbound traffic (spoofing the gateway to random addresses, so no packets reach the actual gateway)
If it is only running IPV6, ARP spoofing was mostly patched out (as the ARP protocol was superceded by IPV6's NDP (neighbor discovery protocol)) but it may still be possible for Alice to spoof. Look into NDP spoofing.
If you are on Windows on your attacking computer, use Netcut. If you are on linux, use Tuxcut.
TuxCut link:
http://a-atalla.github.io/tuxcut/NDP Wikipedia:
https://en.wikipedia.org/wiki/Neighbor_Discovery_ProtocolARP Wikipedia:
https://en.wikipedia.org/wiki/Address_Resolution_ProtocolI don't know much about NDP spoofing. Sorry.