Skip to content

Python script for ARP spoofing using Scapy library,

License

Notifications You must be signed in to change notification settings

mirawara/arp-spoofer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Arp Spoofer

project-image project-image

Arp Spoofing

arp-spoofer is a Python program that allows you to perform ARP spoofing on a local network. ARP spoofing is an attack technique where an attacker sends forged ARP packets on the network to manipulate the ARP table of target devices, creating a false association between IP addresses and MAC addresses. It allows an attacker to intercept and manipulate network traffic between a victim/target and the gateway/router by forging ARP packets.

It is important to note that ARP spoofing is a potentially illegal and unethical activity if used without proper authorization. This tool should only be used for educational purposes or on authorized networks with the explicit permission of the network owner.

Ensure that you have the necessary permissions to run the program and perform ARP spoofing on your network.

🛠️ Installation Steps:

Install the requirements:

pip -r requirements.txt

You MUST enable ip forwarding first:

echo 1 > /proc/sys/net/ipv4/ip_forward

🖥️ Usage:

Manual:

arp-spoofer.py [-h] -t TARGET -g GATEWAY -n FREQUENCY

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        IP address of the victim/target
  -g GATEWAY, --gateway GATEWAY
                        IP address of the gateway
  -f FREQUENCY, --frequency FREQUENCY
                        Number of seconds to wait before retrying the spoof operation

Examples:

  1. Spoof ARP between a target (192.168.1.100) and the gateway (192.168.1.1) with a frequency of 2 seconds:
python arp-spoofer.py -t 192.168.1.100 -g 192.168.1.1 -f 2
  1. Spoof ARP between a target (10.0.0.5) and the gateway (10.0.0.1) with a frequency of 5 seconds:
python arp-spoofer.py --target 10.0.0.5 --gateway 10.0.0.1 --frequency 5

😉 Tip:

Use arp-spoofer together with my dns-spoofer for more complex attacks.

💖Like my work?

Contact me if you have any corrections or additional features to offer.

Releases

No releases published

Packages

No packages published

Languages