arp-spoofer is a Python program that allows you to perform ARP spoofing on a local network. ARP spoofing is an attack technique where an attacker sends forged ARP packets on the network to manipulate the ARP table of target devices, creating a false association between IP addresses and MAC addresses. It allows an attacker to intercept and manipulate network traffic between a victim/target and the gateway/router by forging ARP packets.
It is important to note that ARP spoofing is a potentially illegal and unethical activity if used without proper authorization. This tool should only be used for educational purposes or on authorized networks with the explicit permission of the network owner.
Ensure that you have the necessary permissions to run the program and perform ARP spoofing on your network.
Install the requirements:
pip -r requirements.txt
You MUST enable ip forwarding first:
echo 1 > /proc/sys/net/ipv4/ip_forward
Manual:
arp-spoofer.py [-h] -t TARGET -g GATEWAY -n FREQUENCY
options:
-h, --help show this help message and exit
-t TARGET, --target TARGET
IP address of the victim/target
-g GATEWAY, --gateway GATEWAY
IP address of the gateway
-f FREQUENCY, --frequency FREQUENCY
Number of seconds to wait before retrying the spoof operation
Examples:
- Spoof ARP between a target (192.168.1.100) and the gateway (192.168.1.1) with a frequency of 2 seconds:
python arp-spoofer.py -t 192.168.1.100 -g 192.168.1.1 -f 2
- Spoof ARP between a target (10.0.0.5) and the gateway (10.0.0.1) with a frequency of 5 seconds:
python arp-spoofer.py --target 10.0.0.5 --gateway 10.0.0.1 --frequency 5
Use arp-spoofer together with my dns-spoofer for more complex attacks.
Contact me if you have any corrections or additional features to offer.