Skip to content

A Python-based ARP spoofing tool designed to intercept and analyze network traffic, enabling packet capture and secure restoration of ARP tables.ARP Poisoning

License

Notifications You must be signed in to change notification settings

prakharvr02/ARP-Cache-Poisoning

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ARP Poisoning and Packet Sniffing Script

Overview

This script performs ARP poisoning on a specified victim and gateway in a network, allowing the interception of packets between the two devices. Captured packets are saved in a .pcap file for further analysis.

It also restores ARP tables to their original state after the poisoning process is stopped, ensuring minimal disruption to the network.

Features

  • Performs ARP poisoning on a victim and gateway.
  • Sniffs and saves packets related to the victim's IP in a .pcap file.
  • Restores ARP tables after execution.

Prerequisites

  • Python 3.x
  • Scapy library: Install it using:
    pip install scapy
    

Usage

python script.py <victim IP> <gateway IP> <interface>

About

A Python-based ARP spoofing tool designed to intercept and analyze network traffic, enabling packet capture and secure restoration of ARP tables.ARP Poisoning

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages