https://github.com/arkregiel/arp-cache-poisoning
Python script performing an ARP cache poisoning (ARP spoofing) attack
https://github.com/arkregiel/arp-cache-poisoning
arp-poisoning arp-spoofing python python3 scapy scapy-arp
Last synced: 7 months ago
JSON representation
Python script performing an ARP cache poisoning (ARP spoofing) attack
- Host: GitHub
- URL: https://github.com/arkregiel/arp-cache-poisoning
- Owner: arkregiel
- License: mit
- Created: 2022-08-26T21:41:04.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2022-08-29T20:50:04.000Z (about 3 years ago)
- Last Synced: 2025-01-13T19:39:15.940Z (9 months ago)
- Topics: arp-poisoning, arp-spoofing, python, python3, scapy, scapy-arp
- Language: Python
- Homepage:
- Size: 4.88 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ARP cache poisoning
Python script performing an ARP cache poisoning (ARP spoofing) attack.
Script redirects and captures traffic between a victim and the default gateway.## Disclaimer
This is for educational purposes only. I DO NOT encourage or promote any illegal activities.
## Install requirements
```
$ pip install -r requirements.txt
```## Usage
Program has to be run as an administrator or root
```
$ python arp_poison.py --help
usage: arp_poison.py [-h] -i INTERFACE -g GATEWAY [-c COUNT] victimARP cache poisoning attack
positional arguments:
victim victim's IPv4 addressoptional arguments:
-h, --help show this help message and exit
-i INTERFACE, --interface INTERFACE
network interface (ie. eth0)
-g GATEWAY, --gateway GATEWAY
default gateway's IPv4 address
-c COUNT, --count COUNT
number of packets to capture
```Victim's IPv4 address, gateway's IPv4 address and an interface name are required.
## Example
```
$ python arp_poison.py -i eth0 -g 192.168.1.1 192.168.1.100
```