Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

doesn't report / do anything #1

Open
arch-user-france1 opened this issue Aug 19, 2021 · 6 comments
Open

doesn't report / do anything #1

arch-user-france1 opened this issue Aug 19, 2021 · 6 comments

Comments

@arch-user-france1
Copy link

192.168.0.1 (192.168.0.1) -- kein Eintrag
............................................................................................................................................
..............................................................................................................................................
^C

--- why?

@Enixes
Copy link
Owner

Enixes commented Aug 20, 2021

Are you sure that the attack was triggered and it was an ARP spoof?
Although, this script is old and not actively maintained but it should still detect an ARP spoof attempt on the node where its running

@arch-user-france1
Copy link
Author

  1. Yes it was running you can see the output
  2. It was an $(arpspoof) on a rasperry pi that worked very well
  3. Isn't it possible to set a fake mac-address and do a man-in-the-middle? Is this also detected by the script

@Enixes
Copy link
Owner

Enixes commented Aug 21, 2021

Well, this script essentially tracks the gateway to which your node is connected to and if it detects any changes then it reports the new gateway name and its MAC address. So the attack wasn't successful which can be due to many things, most common being Packet forwarding disabled on your attack node.
You can turn it on using this:

sysctl -w net.ipv4.ip_forward=1

In case if this also doesn't work then that just means the gateway on your victim node is not changing which can be due to numerous reasons like packet filtering, firewall etc

Spoofing is a type of Man in the middle so yes this script detects that and you can change the mac address using MacChanger command

@arch-user-france1
Copy link
Author

I think this is trash because it didn't report anything but As I said I checked that is works using the arp -a command
The arp -a command reported a mac twice so I assume the attack was successful

@arch-user-france1
Copy link
Author

I checked the script shortly
Do you use arp _gateway to get the mac?

@Enixes
Copy link
Owner

Enixes commented Aug 22, 2021

Yes

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants