Skip to content
This repository has been archived by the owner on Feb 8, 2018. It is now read-only.

Detect ARP spoofing/poisoning #30

Open
lctrcl opened this issue May 3, 2016 · 1 comment
Open

Detect ARP spoofing/poisoning #30

lctrcl opened this issue May 3, 2016 · 1 comment

Comments

@lctrcl
Copy link

lctrcl commented May 3, 2016

Few different ideas/realizations:

@pirate
Copy link
Owner

pirate commented May 3, 2016

Awesome idea, thanks! Looks like we'd want to implement both the first link and the last one, since they alert about different things.

The first python script alerts if your MAC is being spoofed on the local network so someone else receives your incoming traffic.
The pastebin bash + growl script alerts if the gateway MAC is being spoofed so someone else is receiving all outgoing traffic.

Both would be incredibly valuable to have, although I'm not sure what the best way to implement this is, since both require running a whole bunch of commands on every poll cycle.
I think the best way is to add a new generic source that is capable of running a shell script and yielding the output. Then we can bundle both these detectors into seperate shell scripts that get run by the source, which passes it to the parsers then the alerters.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

2 participants