Query: arpspoof
OS: debian
Section: 8
Format: Original Unix Latex Style Formatted with HTML and a Horizontal Scroll Bar
ARPSPOOF(8) System Manager's Manual ARPSPOOF(8)NAMEarpspoof - intercept packets on a switched LANSYNOPSISarpspoof [-i interface] [-c own|host|both] [-t target] [-r] hostDESCRIPTIONarpspoof redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies. This is an extremely effective way of sniffing traffic on a switch. Kernel IP forwarding (or a userland program which accomplishes the same, e.g. fragrouter(8)) must be turned on ahead of time.OPTIONS-i interface Specify the interface to use. -c own|host|both Specify which hardware address t use when restoring the arp configuration; while cleaning up, packets can be send with the own address as well as with the address of the host. Sending packets with a fake hw address can disrupt connectivity with certain switch/ap/bridge configurations, however it works more reliably than using the own address, which is the default way arpspoof cleans up afterwards. -t target Specify a particular host to ARP poison (if not specified, all hosts on the LAN). Repeat to specify multiple hosts. -r Poison both hosts (host and target) to capture traffic in both directions. (only valid in conjuntion with -t) host Specify the host you wish to intercept packets for (usually the local gateway).SEE ALSOdsniff(8), fragrouter(8)AUTHORDug Song <dugsong@monkey.org> ARPSPOOF(8)
| Related Man Pages | 
|---|
| carp(4) - netbsd | 
| arp(4) - mojave | 
| arping(8) - redhat | 
| arping(8) - debian | 
| dnsspoof(8) - debian | 
| Similar Topics in the Unix Linux Community | 
|---|
| iptables: block/allow ftp | 
| LAN Simulatar | 
| telnet problem, help | 
| where is Ip address stored | 
| host name to IP address |