bettercap/packets/arp.go
onura 33f2dc30cf fix: Arp spoofing poisons other devices although arg.spoof.targets is set to a single IP.
Although a target IP is set for arp spoofing, other devices get poisoned. When I analyze the traffic, I can see that bettercap-ng keeps broadcasting ARP replies.I mean target Mac is specified in ARP but not ethernet. This also cause a lot of GARP replies to be sent by colliding endpoint (probably gateway). This pr fixed the issue by sending unicast ARP replies as specified at RFC826.
2018-01-28 01:26:01 +03:00

41 lines
1.2 KiB
Go

package packets
import (
"net"
"github.com/google/gopacket/layers"
)
func NewARPTo(from net.IP, from_hw net.HardwareAddr, to net.IP, to_hw net.HardwareAddr, req uint16) (layers.Ethernet, layers.ARP) {
eth := layers.Ethernet{
SrcMAC: from_hw,
DstMAC: to_hw,
EthernetType: layers.EthernetTypeARP,
}
arp := layers.ARP{
AddrType: layers.LinkTypeEthernet,
Protocol: layers.EthernetTypeIPv4,
HwAddressSize: 6,
ProtAddressSize: 4,
Operation: req,
SourceHwAddress: from_hw,
SourceProtAddress: from.To4(),
DstHwAddress: to_hw,
DstProtAddress: to.To4(),
}
return eth, arp
}
func NewARP(from net.IP, from_hw net.HardwareAddr, to net.IP, req uint16) (layers.Ethernet, layers.ARP) {
return NewARPTo(from, from_hw, to, []byte{0, 0, 0, 0, 0, 0}, req)
}
func NewARPRequest(from net.IP, from_hw net.HardwareAddr, to net.IP) (error, []byte) {
eth, arp := NewARP(from, from_hw, to, layers.ARPRequest)
return Serialize(&eth, &arp)
}
func NewARPReply(from net.IP, from_hw net.HardwareAddr, to net.IP, to_hw net.HardwareAddr) (error, []byte) {
eth, arp := NewARPTo(from, from_hw, to, to_hw, layers.ARPReply)
return Serialize(&eth, &arp)
}