I added a py file that will allow us to arp spoof. It is loosely based on the executable arpspoof, available on linux. I added command line arguments for it as well, though it still uses hardcoded values and not all arguments are complete.
I also ported over the previous sniffer code we have so that we can use it. The sniff, dissect, detect model should work the same. I changed the socket htons so that we'd receive the correct ethernet packet type. I started to dissect ARP packets, though the code is still a little messy.
This PR doesn't contribute any "complete" work, rather it provides a proof of concept and understanding for how to create and destruct ARP packets. At the moment I'm not sure how the table should be structured, and I haven't thought about it much. Because both the attacker and detector code are incomplete, we should focus on the detector first. We will be able to use the arpspoof command in the meantime.
I added a py file that will allow us to arp spoof. It is loosely based on the executable
arpspoof
, available on linux. I added command line arguments for it as well, though it still uses hardcoded values and not all arguments are complete.I also ported over the previous sniffer code we have so that we can use it. The sniff, dissect, detect model should work the same. I changed the socket htons so that we'd receive the correct ethernet packet type. I started to dissect ARP packets, though the code is still a little messy.
This PR doesn't contribute any "complete" work, rather it provides a proof of concept and understanding for how to create and destruct ARP packets. At the moment I'm not sure how the table should be structured, and I haven't thought about it much. Because both the attacker and detector code are incomplete, we should focus on the detector first. We will be able to use the
arpspoof
command in the meantime.