Skip to content
This repository has been archived by the owner on Mar 6, 2023. It is now read-only.
/ anti-arp Public archive

Undos arp spoofing from popular parental controls devices

License

Notifications You must be signed in to change notification settings

9p4/anti-arp

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Anti ARP

Undos ARP spoofing from popular parental controls devices

HOWTO:

  1. Prerequisites: Install Python 3 (not 2) on any machine. You need admin access on the machine, and it must be on the same network as the device that is doing the ARP spoofing.
  2. Install modules: python3 -m pip install -r requirements.txt. Preferably under a venv.
  3. Create configuration file. This can be called anything, but config.txt works well. The first line MUST be the router. The format is "IP MAC" with IP being the IP address of the device you want to undo the ARP spoofing on, and MAC is the hardware address. Google "How to find mac address on xyz" if you don't know how to get it
  4. This program must be run as admin / root. Run the file with python3 anti-arp.py config.txt. If you want more details about what is going on, add a --verbose after it, like so: python3 anti-arp.py config.txt --verbose.
  5. Let it run in the background. It may hog some CPU.

Sample config file

192.168.1.1 52:54:00:11:68:c1
192.168.1.2 52:54:00:b7:d7:a5

Want to not use the GUI?

Add --ignore-gooey in the program params!

Quickstart (WIP)

MacOS

Requirements: Admin privileges on MacOS (pretty much any version from the past eight years)

  1. Install Homebrew here. If you don't want to use Homebew, download Python3 from here and skip the next step.
  2. Install Python 3 with brew install python3.
  3. Download this repo by downloading the zip. Click here, click assets, and download the one that says "Source code (zip)".
  4. Extract the folder to your Downloads folder.
  5. [The following instructions are in terminal] Create a virtual environment with cd Downloads; python3 -m venv venv.
  6. Activate the virtual environment with source venv/bin/activate.
  7. Install Python requirements with cd anti-arp-[VERSION]; pip3 install -r requirements.txt. You have to know the name of the extracted zip.
  8. Create a config file as outlined above.
  9. Run the program with sudo ../venv/bin/python3 anti_arp.py. You'll need to type in the password. It won't show up, but it's being typed.
  10. Open the config file in the GUI.
  11. Press "start" to start.
  12. Press "stop" to stop (the network should go back to normal within a few seconds).

Windows

Requirements: Admin privileges on Windows (heck, even XP should work)

  1. Download the exe from the "releases" tab here.
  2. Create the config file with Notepad. Read the HOWTO section to learn how to make a config file.
  3. Right-click the exe and run as administrator. You can trust me, look at the code if you aren't sure.
  4. Open the config file in the GUI.
  5. Press "start" to start.
  6. Press "stop" to stop (the network should go back to normal within a few seconds).

About

Undos arp spoofing from popular parental controls devices

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages