diff --git a/Tutorial 1/README.md b/Tutorial 1/README.md
index 3eef028..2d07f95 100644
--- a/Tutorial 1/README.md	
+++ b/Tutorial 1/README.md	
@@ -57,6 +57,8 @@ disable
 ```sh
 sudo -i
 ifconfig eth0 192.168.1.1X netmask 255.255.255.0
+route add default gw 192.168.1.1
+echo "nameserver 208.67.222.222" > /etc/resolv.conf
 # watch the result using the command below
 ip addr show
 ```
@@ -69,3 +71,60 @@ sudo arpspoof -i eth0 -t 192.168.1.11 192.168.1.1
 # Spy traffic from router to victim
 sudo arpspoof -i eth0 -t 192.168.1.1 192.168.1.11
 ```
+
+## MAC Flooding
+### Switch Configuration
+```sh
+enable
+clear mac address-table dynamic
+```
+
+### Kali Linux
+```sh
+ping 192.168.1.1
+# after the ping we should have 2 Mac addresses in the table
+macof
+# after the macof we have overflow of mac addresses
+```
+
+## DHCP Spoofing
+```sh
+sudo -i
+apt install yersinia
+```
+### Perform DHCP Starvation
+- Start yersinia-graphical
+- Select `Launch Attack`
+- Select `DHCP`
+- Select sending `DISCOVER packet`
+- Select `Ok`
+- Open ettercap-graphical
+- Go to MITM menu
+- Select `DHCP Spoofing`
+- Set configurations
+  - IP Pool: 192.168.1.10-192.168.1.20
+  - Netmask: 255.255.255.0
+  - 
+
+### Disable DHCP
+Because DHCP doesn't work on the victim machine, we need to disable it.
+```sh
+enable
+configure terminal
+no service dhcp
+
+```
+
+### On victim machine
+```sh
+ifconfig eth0 0.0.0.0
+dhclient -r
+dhclient eth0
+```
+
+## DNS Spoofing
+- Go to ettercap-graphical
+- Start a DHCP Spoofing
+- Select configuration as victim (192.168.1.0 255.255.255.0 1.1.1.1)
+- Go to Plugins
+- Activate `dns_spoof`
\ No newline at end of file