Commit graph

4 commits

Author SHA1 Message Date
oscar1
d59b282fb9 Update ARP.py
small change to fix the "half duplex" issue. First; without the fix I don't receive any packets from the remote host to the target. I only received packets from the target to the remote host. Second; the original code wasn't "symmetric". Tested on kali2 with a linksys WRT54GL router on WiFI. Compared the ARP packets to those produced by ettercap, which was working correctly on my system. Including the fix resembles the ettercap method. It also works correctly when the arguments to the Ether() constructor are removed altogether.

Note that the problem occurs when not using any modules at all, only a simple filter and the spoofplugin. The problem may also be routerspecific, I dont know.
2016-03-06 15:48:40 +01:00
byt3bl33d3r
df608030f3 fixes #178, we are now manually adding an Ether() layer to ARP packets and sending them at L2 2015-09-02 14:47:25 +02:00
byt3bl33d3r
772ef9ab39 responder code is now up to date with the lastest version
logging is going to have to get cleaned up, but that's a minor issue
re-implemented the function to add endpoints to the http server
added an option to manually specify the gateways mac in the Spoofer plugin
2015-08-05 13:31:04 +02:00
byt3bl33d3r
fd9b79c617 first pass at refactoring:
directory structure has been simplified by grouping all the poisoners and servers in one folder
impacket smb server has been replaced with responder's
flask http server has beem replaced with responder's
modified config file to support new changes
2015-08-02 21:15:10 +02:00
Renamed from core/poisoners/arp/ARPpoisoner.py (Browse further)