{"id":351,"date":"2006-10-02T21:47:01","date_gmt":"2006-10-02T21:47:01","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/10\/arp-sk-arp-swiss-army-knife-tool\/"},"modified":"2015-09-09T19:40:34","modified_gmt":"2015-09-09T11:40:34","slug":"arp-sk-arp-swiss-army-knife-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/10\/arp-sk-arp-swiss-army-knife-tool\/","title":{"rendered":"arp-sk – ARP Swiss Army Knife Tool"},"content":{"rendered":"

arp-sk is basically an ARP Traffic Generation Tool. It’s quite old but still very useful!<\/p>\n

There are 2 basics mode:
\n – who-has: build a request ARP message.
\n – reply: build a reply ARP message (default)<\/p>\n

Other advanced modes should come very soon
\n – arping: send a who-has to every host on the LAN to see who is here
\n – promisc: detection of boxes that are sniffing on the network using promiscuous mode of their network interface
\n – arpmim: perform Man in the Middle attack<\/p>\n

Link level options<\/strong><\/p>\n

-s: set the source address of the packet.
\n Default : MAC address of the interface used to send the packets.<\/p>\n

-d: set the destination address of the packet
\n Default: broadcast<\/p>\n

These 2 options have a strong influence on the ARP message itself.
\nHere are the default according to these options:<\/p>\n

– request<\/p>\n