Skip to content
/ ARPie Public

ARP/DNS Poisoning and WPAD Exploitation Script

Notifications You must be signed in to change notification settings

mverschu/ARPie

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 

Repository files navigation

ARP/DNS Poisoning and WPAD Exploitation Script

ARPie

Note

  • Currently does not forward traffic which disconnects the attacked host from internet.
  • Packets will be restored when the attack is stopped.

Overview

This script performs ARP poisoning, DNS spoofing, and WPAD exploitation. It is designed for network penetration testing and security analysis.

Features

  • ARP Poisoning: Redirect network traffic by spoofing ARP messages.
  • DNS Spoofing: Intercept and modify DNS queries to redirect traffic.
  • WPAD Exploitation: Serve a malicious WPAD file to configure a proxy server for the victim.

Requirements

  • Python 3.x
  • Scapy
  • Impacket
  • Colorama

Installation

  1. Install required Python packages:
    pip install scapy impacket colorama

Usage

python arp.py -i <interface> --target-ip <target_ip> [options]

Arguments

  • -i, --interface: Network interface to use (required)
  • --target-ip: Target IP address (required)
  • --target-mac: Target MAC address (optional, will be resolved if not provided)
  • --gateway-ip: Gateway IP address (optional, will be resolved if not provided)
  • --gateway-mac: Gateway MAC address (optional, will be resolved if not provided)
  • --attacker-ip: Attacker's IP address (optional, will be resolved if not provided)
  • --proxy-port: Port for the proxy server (optional)
  • --domain: Domain to spoof (optional, e.g., domain.local)

Example

# Auto
sudo python3 arp.py -i eth0 --target-ip 192.168.1.100 --proxy-port 8080 --domain example.com
# Manual (most trustable method)
sudo python3 arp.py --target-ip 192.168.100.183 --target-mac 52:54:00:9f:47:11 --gateway-ip 192.168.100.153 --gateway-mac 52:54:00:b0:a1:55 --attacker-ip 192.168.100.131 --domain wintastic.local -i eth0

Screenshots

Computer take over

image

User take over

image

By following the instructions above, you can utilize this script for network security testing and analysis. Ensure you have permission to test the network you are targeting.

About

ARP/DNS Poisoning and WPAD Exploitation Script

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages