From 728508ce12346de8bf7e40dc3cf6ce4cb917d104 Mon Sep 17 00:00:00 2001 From: moriya <44200760+m0riya42@users.noreply.github.com> Date: Sat, 16 Oct 2021 23:32:36 +0300 Subject: [PATCH] Update README.md --- Arp-Spoofing-Detection/README.md | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/Arp-Spoofing-Detection/README.md b/Arp-Spoofing-Detection/README.md index e40276c..0476c8a 100644 --- a/Arp-Spoofing-Detection/README.md +++ b/Arp-Spoofing-Detection/README.md @@ -1,5 +1,4 @@ # ARP Spoofing Detection -## Ways to Recognize ARP spoofing ### Options which can lead to ARP SPOOFING. * Duplicated address in the ARP table. @@ -11,12 +10,12 @@ in Order to Detect an Attack, the code is checking how many options from above is happenning. ### Conclusions -less than 2 options: probably there is no Attack. -between 2 and 3 options: the computer may be at risk. -between 4 and 5 options: you are under attack. +* less than 2 options: probably there is no Attack. +* between 2 and 3 options: the computer may be at risk. +* between 4 and 5 options: you are under attack. in order to protect the computer, we set the ARP table with static address using the command: -os.system("arp -s " + attacked_ip_addres+" " + real_mac_address) +
os.system("arp -s " + attacked_ip_addres+" " + real_mac_address)