arp-scan
exploits
arp-scan | exploits | |
---|---|---|
4 | 3 | |
895 | 574 | |
- | - | |
5.6 | 2.8 | |
about 1 month ago | 4 months ago | |
C | C | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
arp-scan
-
Taking minutes to load navigation pages, playback frequently pausing without ability to resume
Interface: eth0, type: EN10MB, MAC: 24:4b:fe:83:b1:cf, IPv4: 192.168.188.58WARNING: Cannot open MAC/Vendor file /opt/share/arp-scan/ieee-oui.txt: No such file or directoryWARNING: Cannot open MAC/Vendor file /opt/share/arp-scan/ieee-iab.txt: No such file or directoryWARNING: Cannot open MAC/Vendor file /opt/share/arp-scan/mac-vendor.txt: No such file or directoryStarting arp-scan 1.9.7 with 256 hosts (https://github.com/royhills/arp-scan)192.168.188.1 24:65:11:ec:dd:34 (Unknown)192.168.188.10 dc:a6:32:a6:9b:5d (Unknown)192.168.188.34 a0:51:0b:0d:73:3e (Unknown) 4 packets received by filter, 0 packets dropped by kernelEnding arp-scan 1.9.7: 256 hosts scanned in 1.813 seconds (141.20 hosts/sec). 3 responded
-
Port Forwarding
Or, use a tool like arp-scan
-
How to know new devices in my local network?
There's this: https://github.com/royhills/arp-scan
-
Linux网络命令集锦
Interface: eth0, type: EN10MB, MAC: da:78:c8:7a:fb:26, IPv4: 195.133.11.43 Starting arp-scan 1.9.7 with 512 hosts (https://github.com/royhills/arp-scan) 195.133.10.1 00:1f:ce:72:bd:8c QTECH LLC 195.133.10.2 56:85:8e:2b:cf:11 (Unknown: locally administered) 195.133.10.5 de:58:c6:5b:b5:c2 (Unknown: locally administered) 195.133.10.7 de:ed:ae:4b:7a:c8 (Unknown: locally administered) 195.133.10.6 d2:a6:f4:4c:f0:4b (Unknown: locally administered) `
exploits
-
Nothing new under the Sun - Discovering and exploiting a CDE bug chain
I have identified multiple security vulnerabilities that are exploitable via the the setuid-root dtprintinfo binary from the Common Desktop Environment (CDE) distributed with Oracle Solaris 10. I demonstrated the possibility to chain together a printer name injection bug in dtprintinfo and a stack-based buffer overflow in libXm to achieve local privilege escalation to root on a fully-patched Solaris 10 system. The exploit is available at https://github.com/0xdea/exploits/blob/master/solaris/raptor_dtprintlibXmas.c.
- [ITA] - Marco Ivaldi aka raptor
-
Multiple vulnerabilities in Zyxel zysh
The format string exploit written in Tcl/Expect (!) is here: https://github.com/0xdea/exploits/blob/master/zyxel/raptor_zysh_fhtagn.exp
What are some alternatives?
WendzelNNTPd - A usable and IPv6-ready Usenet-server (NNTP daemon). It is portable (Linux/*BSD/*nix), supports AUTHINFO authentication, contains ACL as well as role based ACL and provides "invisible" newsgroups. It can run on MySQL and SQLite backends.
vulns - HN Security's advisories.
rawhide - find files using pretty C expressions
bbcp - BlackBox Cross-Platform (Windows, GNU/Linux, OpenBSD, FreeBSD)
raptor_infiltrate20 - #INFILTRATE20 raptor's party pack.
dhcp - ISC DHCP is enterprise grade, open source solution for DHCP servers, relay agents, and clients, supports both IPv4 and IPv6, and is suitable for use in high-volume and high-reliability applications.
vulns - Named vulnerabilities and their practical impact
kdai - kdai(Kernel Dynamic ARP Inspection) is a linux kernel module to defend against arp cache poisoning
mg - Micro (GNU) Emacs-like text editor ❤️ public-domain
pkg_ping - Prints or writes the fastest OpenBSD mirror(s); or easily replace the mirror in /etc/installurl which went down.
arpsentinel-applet - cinnamon applet for monitor events on the LAN: IP conflicts, ARP floods, ARP spoofing, network scannings, MAC changes, IP changes, etc