Skip to content

Pythom script written with Scapy for MITM attack (Arp Cache Poisoning)

License

Notifications You must be signed in to change notification settings

nxenon/arp-spoof

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ARP Cache Poisoning

Script for MITM attack (ACP)

Usage

  • How to use:

    sudo python3 arp_spoof.py -i <interface> -t1 <target1> -t2 <target2>

  • To get help use:

    sudo python3 arp_spoof.py -h

Example

sudo python3 arp_spoof.py -i eth0 -t1 192.168.1.1 -t2 192.168.1.50

Note

  • You have to run this script with root privileges !
  • You should have enabled ip forwarding on your machine !

About

Pythom script written with Scapy for MITM attack (Arp Cache Poisoning)

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages