Skip to content

A simple and effective script uses Arp attacks to disconnect users in the LAN \ 简单有效的脚本利用Arp攻击让局域网内用户断开连接

License

Notifications You must be signed in to change notification settings

ystemsrx/Arp-Attack-tool

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

65 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

中文

Click here for beginners

ARP Attack Tool

Welcome to the ARP Attack Tool, a mischievous tool designed to let you explore the vulnerabilities of network protocols. Whether you want to play harmless pranks or understand the importance of network security, this script is your playful partner in crime (for educational purposes only, of course!).

Table of Contents

Overview

The script is a program that performs ARP (Address Resolution Protocol) spoofing on a network. It is intended to illustrate how network attacks can occur and to emphasize the need for robust security measures. The script allows you to temporarily disrupt a device's network connection, perfect for stopping those pesky free-loaders on your Wi-Fi or pranking your loud relatives during their gaming sessions.

There is also a PyQt5 based GUI version available. Click here.

Features

  • Network Scanning: Automatically scans and lists devices on your network, showing their IP and MAC addresses.
  • Manufacturer Detection: Attempts to identify the manufacturer of each network device.
  • ARP Spoofing: Sends spoofed ARP packets to selected devices, potentially disrupting their network connectivity.
  • Multi-threading: Uses threads to target multiple devices simultaneously.

Requirements

To run this script, you will need:

  • Python 3.x

  • The following Python packages:

    • scapy
    • netifaces
    • requests
    • python-nmap
    • PyQt5(Optional)
  • nmap

For Linux user, please ensure you have root access to your network interface to execute this script.

Installation

  1. Clone the repository:

    git clone https://github.com/ystemsrx/arp-attack-tool.git
    cd arp-attack-script
  2. Install the required packages:

    pip install -r requirements.txt

    To run the GUI version, run pip install PyQt5 in your terminal.

Usage

  1. Run the script:

    sudo python Arp_Attack.py

    or

    sudo python Arp_Attack_GUI.py
  2. Follow the prompts:

    • The script will scan your network and display a list of online devices.
    • Enter the indices of the devices you wish to target (e.g., 0 2 4).
    • Specify the number of packets per second you want to send.
  3. Watch the chaos unfold:

    • The script will start sending ARP packets to the targeted devices, potentially disrupting their network connections.

Troubleshooting

Issue: If you encounter the following error message:

Failed to scan network: Sniffing and sending packets is not available at layer2: winpcap is not installed. You may use conf.L3socket or comg.L3socket6 to access layer 3.

Solution: This error occurs because WinPcap is not installed on your system. To resolve this issue, you have to:

Install Npcap: Npcap is a modern replacement for WinPcap and is compatible with most applications that require WinPcap. You can download and install Npcap from Npcap's official website.

Disclaimer

This script is provided for educational purposes only. It is meant to demonstrate the vulnerabilities in network protocols and emphasize the importance of network security. Use it responsibly and only on networks where you have explicit permission. Unauthorized use of this script on networks that do not belong to you or without permission is illegal and unethical.

Have fun, learn a lot, and remember to use your powers for good!

License

This project is licensed under the MIT License - see the LICENSE file for details.

About

A simple and effective script uses Arp attacks to disconnect users in the LAN \ 简单有效的脚本利用Arp攻击让局域网内用户断开连接

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages