mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2024-12-19 19:36:08 +00:00
Update arp_cache_poisoner.py
This commit is contained in:
parent
94977d4cea
commit
2be4822c18
@ -1,10 +1,6 @@
|
|||||||
#!/usr/bin/env python3
|
#!/usr/bin/env python3
|
||||||
# Example script to perform an ARP cache poisoning attack using SCAPY
|
|
||||||
# v: 0.1
|
|
||||||
# Omar Santos @santosomar
|
|
||||||
#!/usr/bin/env python3
|
|
||||||
# ARP Cache Poisoning Attack using SCAPY
|
# ARP Cache Poisoning Attack using SCAPY
|
||||||
# Version: 0.1
|
# Version: 0.2
|
||||||
# Author: Omar Santos @santosomar
|
# Author: Omar Santos @santosomar
|
||||||
# This script performs an ARP cache poisoning attack using the SCAPY library.
|
# This script performs an ARP cache poisoning attack using the SCAPY library.
|
||||||
# It spoofs ARP replies to the target and gateway, causing them to update their ARP tables with the attacker's MAC address.
|
# It spoofs ARP replies to the target and gateway, causing them to update their ARP tables with the attacker's MAC address.
|
||||||
|
Loading…
Reference in New Issue
Block a user