diff --git a/Arp-Spoofing-Detection/README.md b/Arp-Spoofing-Detection/README.md new file mode 100644 index 0000000..e40276c --- /dev/null +++ b/Arp-Spoofing-Detection/README.md @@ -0,0 +1,23 @@ +# ARP Spoofing Detection +## Ways to Recognize ARP spoofing + +### Options which can lead to ARP SPOOFING. +* Duplicated address in the ARP table. +* To many ARP REPLAYs in small amount of time. +* More than 3 packets of the same IP address in 10 seconds. +* Duplicated Packet- the same IP address with diffrent MAC address. +* Check if the MAC address is belong to the IP address. (using get_mac_address function) + +in Order to Detect an Attack, the code is checking how many options from above is happenning. + +### Conclusions +less than 2 options: probably there is no Attack. +between 2 and 3 options: the computer may be at risk. +between 4 and 5 options: you are under attack. + +in order to protect the computer, we set the ARP table with static address using the command: +os.system("arp -s " + attacked_ip_addres+" " + real_mac_address) + + + +