Arp cache poisoning using scapy
bakbakinfo123 at gmail.com
bakbakinfo123 at gmail.com
Sun Jun 2 16:47:29 EDT 2013
On Sunday, June 2, 2013 11:19:46 AM UTC-7, bakbak... at gmail.com wrote:
> I am trying to get the arp cache poisoning working with scapy and python but having problems
>
>
>
> The python script itself is very simple:
>
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts# cat arp_poison.py
>
> #!/usr/bin/env python
>
>
>
> import sys
>
>
>
> from scapy.all import *
>
>
>
> arpcachepoison("00:22:fa:98:5e:04", "192.168.1.131")
>
>
>
> The error I am getting is illegal IP address. How do I fix it?
>
>
>
>
>
>
>
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts# python arp_poison.py
>
> WARNING: No route found for IPv6 destination :: (no default route?)
>
> Traceback (most recent call last):
>
> File "arp_poison.py", line 7, in <module>
>
> arpcachepoison("00:22:fa:98:5e:04", "192.168.1.131")
>
> File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 440, in arpcachepoison
>
> tmac = getmacbyip(target)
>
> File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 53, in getmacbyip
>
> tmp = map(ord, inet_aton(ip))
>
> socket.error: illegal IP address string passed to inet_aton
>
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts#
>
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts#
More information about the Python-list
mailing list