Update arp_cache_poisoner.py

This commit is contained in:
Omar Santos 2023-05-02 23:39:36 -04:00 committed by GitHub
parent 94977d4cea
commit 2be4822c18
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23

View file

@ -1,10 +1,6 @@
#!/usr/bin/env python3 #!/usr/bin/env python3
# Example script to perform an ARP cache poisoning attack using SCAPY
# v: 0.1
# Omar Santos @santosomar
#!/usr/bin/env python3
# ARP Cache Poisoning Attack using SCAPY # ARP Cache Poisoning Attack using SCAPY
# Version: 0.1 # Version: 0.2
# Author: Omar Santos @santosomar # Author: Omar Santos @santosomar
# This script performs an ARP cache poisoning attack using the SCAPY library. # This script performs an ARP cache poisoning attack using the SCAPY library.
# It spoofs ARP replies to the target and gateway, causing them to update their ARP tables with the attacker's MAC address. # It spoofs ARP replies to the target and gateway, causing them to update their ARP tables with the attacker's MAC address.