Arp cache poisoning using scapy

bakbakinfo123 at gmail.com bakbakinfo123 at gmail.com
Sun Jun 2 16:47:29 EDT 2013


On Sunday, June 2, 2013 11:19:46 AM UTC-7, bakbak... at gmail.com wrote:
> I am trying to get the arp cache poisoning working with scapy and python but having problems
> 
> 
> 
> The python script itself is very simple:
> 
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts# cat arp_poison.py 
> 
> #!/usr/bin/env python
> 
> 
> 
> import sys
> 
> 
> 
> from scapy.all import *
> 
> 
> 
> arpcachepoison("00:22:fa:98:5e:04", "192.168.1.131")
> 
> 
> 
> The error I am getting is illegal IP address. How do I fix it?
> 
> 
> 
> 
> 
> 
> 
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts# python arp_poison.py
> 
> WARNING: No route found for IPv6 destination :: (no default route?)
> 
> Traceback (most recent call last):
> 
>   File "arp_poison.py", line 7, in <module>
> 
>     arpcachepoison("00:22:fa:98:5e:04", "192.168.1.131")
> 
>   File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 440, in arpcachepoison
> 
>     tmac = getmacbyip(target)
> 
>   File "/usr/lib/python2.7/dist-packages/scapy/layers/l2.py", line 53, in getmacbyip
> 
>     tmp = map(ord, inet_aton(ip))
> 
> socket.error: illegal IP address string passed to inet_aton
> 
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts# 
> 
> root at ubuntu:/home/joker/Downloads/scapy-2.2.0/scripts#




More information about the Python-list mailing list