From 2be4822c18dda82d1f9d31dc5ec1720feef9a397 Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Tue, 2 May 2023 23:39:36 -0400 Subject: [PATCH] Update arp_cache_poisoner.py --- .../exploitation/arp_cache_poisoner.py | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/programming_and_scripting_for_cybersecurity/exploitation/arp_cache_poisoner.py b/programming_and_scripting_for_cybersecurity/exploitation/arp_cache_poisoner.py index 9a23adb..2c090b7 100644 --- a/programming_and_scripting_for_cybersecurity/exploitation/arp_cache_poisoner.py +++ b/programming_and_scripting_for_cybersecurity/exploitation/arp_cache_poisoner.py @@ -1,10 +1,6 @@ #!/usr/bin/env python3 -# Example script to perform an ARP cache poisoning attack using SCAPY -# v: 0.1 -# Omar Santos @santosomar -#!/usr/bin/env python3 # ARP Cache Poisoning Attack using SCAPY -# Version: 0.1 +# Version: 0.2 # Author: Omar Santos @santosomar # This script performs an ARP cache poisoning attack using the SCAPY library. # It spoofs ARP replies to the target and gateway, causing them to update their ARP tables with the attacker's MAC address.