So today, I was doing some pen testing at home may have accidentally poisoned the company ARP table during a man in the middle attack session. I was doing some man in the middle attack, dns spoof and session hijacking testing between some Virtual machines, another laptop, and my router at home and sniffing the traffic at the same time to validate the session, and all of a sudden I noticed company IP's coming across my sniffer. Thats when I realized I was VPN'd into work. <Insert O-Shit scream here> No idea how the arp poisoning attack and dns spoof broke out of my local network. big woops. I called and put in a ticket just to make sure in case it caused problems and they actually think I was doing something. Try explaining that one to tech support. So Note to self for everyone, make sure VPN is not connected when doing pen testing on home network. Better yet.. make damn sure you know exactly where your network traffic can go because murphys law says its going to go all the places you dont want it to. For the non computer geeks. I was practicing breaking into stuff and intercepting network traffic for in transit changes and may have caused issues with the company network. Big no-no.