https://github.com/priyabug/implemented-arp-cache-manipulation-to-identify-and-analyze-network-vulnerabilities.
This analysis focuses on ARP cache manipulation techniques to assess network security risks and analyze vulnerabilities. By modifying ARP tables, we can simulate real-world attack scenarios, study their impact, and implement countermeasures.
https://github.com/priyabug/implemented-arp-cache-manipulation-to-identify-and-analyze-network-vulnerabilities.
arp mitm-attacks scapy sniffing-spoofing
Last synced: 3 months ago
JSON representation
This analysis focuses on ARP cache manipulation techniques to assess network security risks and analyze vulnerabilities. By modifying ARP tables, we can simulate real-world attack scenarios, study their impact, and implement countermeasures.
- Host: GitHub
- URL: https://github.com/priyabug/implemented-arp-cache-manipulation-to-identify-and-analyze-network-vulnerabilities.
- Owner: Priyabug
- Created: 2024-12-22T03:48:20.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2025-02-21T01:54:44.000Z (3 months ago)
- Last Synced: 2025-02-21T02:35:53.728Z (3 months ago)
- Topics: arp, mitm-attacks, scapy, sniffing-spoofing
- Language: Python
- Homepage:
- Size: 35.2 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
Implemented-ARP-cache-manipulation-to-identify-and-analyze-network-vulnerabilities.
Description
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer
address, such as the MAC address, given an IP address. The ARP protocol is a very simple protocol, and
it does not implement any security measure. The ARP cache poisoning attack is a common attack against
the ARP protocol. Using such an attack, attackers can fool the victim into accepting forged IP-to-MAC
mappings. This can cause the victim’s packets to be redirected to the computer with the forged MAC
address, leading to potential man-in-the-middle attacks.

Languages and Utilities Used
- Python
- Ununtu 20.04 VMEnvironments Used
- Windows 10 (21H2)
Lab topics covered
- ARP Cache Poisoning
- MITM Attack on Telnet using ARP Cache Poisoning
- MITM Attack on Netcat using ARP Cache PoisoningShell scripts commands
- `./dc-build.sh` - Build the docker images, it can take one additional parameter to be used in the build process, e.g. `./dc-build.sh --no-cache`.
- `./dc-up.sh` - Start the docker containers in the foreground.
- `./dc-up-d.sh` - Start the docker containers in the background.
- `./dc-stop.sh` - Stop the docker containers, it can take one additional parameter to be used in the stop process.
- `./dc-down.sh` - Stop and remove the docker containers, it can take one additional parameter to be used in the stop and remove process.
- `./dc-unittest.sh` - Utility script to aid in running a specific unit test class.Program walk-through:
- Using Scapy for Sniffing and Spoofing:
1. Launching an ARP cache poisoning attack on a target machine
2. Launching MITM attack on Telnet.
3. Launching MITM atatck on netcat