https://github.com/doorbash/arp-poisoning
A simple Arp sniffing tool that uses Scapy for generating network packets
https://github.com/doorbash/arp-poisoning
Last synced: 11 months ago
JSON representation
A simple Arp sniffing tool that uses Scapy for generating network packets
- Host: GitHub
- URL: https://github.com/doorbash/arp-poisoning
- Owner: doorbash
- Created: 2015-10-26T15:51:49.000Z (over 10 years ago)
- Default Branch: master
- Last Pushed: 2015-10-26T16:45:10.000Z (over 10 years ago)
- Last Synced: 2025-03-13T11:43:58.517Z (about 1 year ago)
- Language: Python
- Homepage:
- Size: 141 KB
- Stars: 3
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# arp-poisoning
A simple Arp sniffing tool that uses Scapy to generate network packets
## Requirements:
- [Pyhton](https://www.python.org/)
- [Scappy](http://www.secdev.org/projects/scapy/)
- [Wireshark](https://www.wireshark.org/)
## How to use:
- Open Terminal with administrator privileges (Linux users type sudo su in terminal).
- Make sure python is installed by typing python --version
- Enable IP Forwarding in your Operating system.Linux users can type echo 1 > /proc/sys/net/ipv4/ip_forward
- Download and setup Scapy python library from http://www.secdev.org/projects/scapy/
- Run program like this : python attack.py -v victimIP -r routerIP Example: python attack.py -v 192.168.1.12 -r 192.168.1.1
- Run Wireshark then capture packets with this filter : ip.addr eq victimIP and ip.addr eq routerIP
Please feel free to contribute!