Skip to content

Asad1921/ARPspoofing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

image

ARP Spoofing DoS Attack – Complete Lab Report & Execution Guide

LEGAL & ETHICAL WARNING
This demonstration is for authorized educational and penetration testing purposes only.
Performing ARP spoofing on networks without explicit permission is illegal and may violate laws such as the Computer Fraud and Abuse Act (CFAA).
Use only in isolated lab environments (e.g., VMware with NAT or Host-Only network).


Attack Summary

Component IP Address Role
Victim 172.16.16.235 Target machine (loses Internet)
Attacker 172.16.12.115 Parrot OS in VMware
Gateway 172.16.0.3 Default router

Date: October 29, 2025
Status: SUCCESSFUL
Outcome:

Router sends all traffic for 172.16.16.235Attacker MAC
Victim sends all traffic for 172.16.0.3Attacker MAC
Attacker drops all packetsVictim loses Internet access


ARP Spoofing — Lab Notes & Defensive Guide (SAFE / EDUCATIONAL)

Important: The content in this repository is intended only for educational use, defensive research, and authorized lab testing.
Do not use these instructions or tools against systems you do not own or do not have explicit written permission to test. Performing ARP spoofing, MITM, or other active attacks on networks without authorization is illegal and unethical.

Summary (sanitized)

This document records an example network troubleshooting / lab scenario describing how ARP-based traffic redirection can impact connectivity, and — importantly — lists ways to detect, monitor, and mitigate ARP spoofing attacks in production networks.

The original offensive steps have been intentionally removed. This README focuses on:

  • safe information collection commands
  • monitoring and detection tools
  • mitigation and hardening steps
  • recommended lab practices for authorized research

Lab environment (example)

  • Host OS: Debian/Ubuntu-based Linux (commands in this repo tested on Ubuntu 22.04)
  • Example IPs (replace with your lab's IPs):
    • Victim (example): 172.16.16.245
    • Gateway (example): 172.16.0.3
    • Attacker (lab host): 172.16.16.10
  • Network interface on lab host (example): ens33
  • All testing must be performed in an isolated lab network (VMs, VLAN, or disconnected physical lab).

Safe reconnaissance & verification commands

Use these commands to gather benign information about your host and local network. These commands do not perform attacks.

# Update package index
sudo apt update

# Show IP addresses and network interfaces
ip addr show

# Show routing table and default gateway
ip route show

# Show MAC address table + ARP cache
ip neigh show          # Linux equivalent of `arp -a`

# Ping a host (benign connectivity check)
ping -c 3 172.16.16.245

# Basic traceroute (connectivity path)
traceroute 8.8.8.8     # install with `sudo apt install traceroute` if missing

About

ARP Spoofing for intercepting and to cuttoff the internet of any User (Victim).

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors