Arp cache poisoning using scapy
bakbakinfo123 at gmail.com
bakbakinfo123 at gmail.com
Sun Jun 2 16:46:31 EDT 2013
On Sunday, June 2, 2013 11:19:46 AM UTC-7, bakbak... at gmail.com wrote:
> I am trying to get the arp cache poisoning working with scapy and python but having problems
>
>
>
> The python script itself is very simple:
>
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts# cat arp_poison.py
>
> #!/usr/bin/env python
>
>
>
> import sys
>
>
>
> from scapy.all import *
>
>
>
> arpcachepoison("00:22:fa:98:5e:04", "192.168.1.131")
>
>
>
> The error I am getting is illegal IP address. How do I fix it?
>
>
>
>
>
>
>
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts# python arp_poison.py
>
> WARNING: No route found for IPv6 destination :: (no default route?)
>
> Traceback (most recent call last):
>
> File "arp_poison.py", line 7, in <module>
>
> arpcachepoison("00:22:fa:98:5e:04", "192.168.1.131")
>
> File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 440, in arpcachepoison
>
> tmac = getmacbyip(target)
>
> File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 53, in getmacbyip
>
> tmp = map(ord, inet_aton(ip))
>
> socket.error: illegal IP address string passed to inet_aton
>
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts#
>
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts#
This works. Although it shouldn't.
The documentation should be changed to reflect this. As per document:
arpcachepoison
arpcachepoison(target,victim,interval=60)
Poison target’s cache with (your MAC,victim’s IP)
It makes more sense to assign a MAC to the vitim ip to falsly claim and poison the network so ideally the documentation is correct the the command does not work as such. However the command with 2 IPs does the thing correctly. So change documentation? How do one go about it?
Also all the items in () need to have "" or it gives syntax error. Is that how it should work?
More information about the Python-list
mailing list