In this section, we will learn how to send a fake ARP reply. The fake ARP reply program is made for the fake ping reply because when the attacker sends the ping request to a particular IP, the attacker machine first sends an ARP request for the MAC address.
When an attacker is on the subnet of the honeypot or outside the subnet, a fake reply will be sent by the honeypot. Let's see the topology diagram:
I have used three machines: Debian running honeypot codes, RHEL, as a gateway, and Kali Linux, as the attacker machine.
Let's see the fake reply code. The code name is arp_reply.py:
- The following modules will be used in the code:
import socket
import struct
import binascii
import Queue
import threading
import sys
- In the following code, two sockets have been created. One for the receiver and one for sending the reply...