diff --git a/Arp-Spoofing-Detection/README.md b/Arp-Spoofing-Detection/README.md index e40276c..0476c8a 100644 --- a/Arp-Spoofing-Detection/README.md +++ b/Arp-Spoofing-Detection/README.md @@ -1,5 +1,4 @@ # ARP Spoofing Detection -## Ways to Recognize ARP spoofing ### Options which can lead to ARP SPOOFING. * Duplicated address in the ARP table. @@ -11,12 +10,12 @@ in Order to Detect an Attack, the code is checking how many options from above is happenning. ### Conclusions -less than 2 options: probably there is no Attack. -between 2 and 3 options: the computer may be at risk. -between 4 and 5 options: you are under attack. +* less than 2 options: probably there is no Attack. +* between 2 and 3 options: the computer may be at risk. +* between 4 and 5 options: you are under attack. in order to protect the computer, we set the ARP table with static address using the command: -os.system("arp -s " + attacked_ip_addres+" " + real_mac_address) +
os.system("arp -s " + attacked_ip_addres+" " + real_mac_address)