Continue...
Opened this issue · 0 comments
alexandre-mbm commented
Ref.: ARP scanning using python and scapy | Logisek Security Blog
>>> scanip.start_scan()
Begin emission:
.**Finished to send 256 packets.
***..................................
Received 40 packets, got 5 answers, remaining 251 packets
xx:xx:xx:xx:xx:xx <---------> 192.168.0.1
xx:xx:xx:xx:xx:xx <---------> 192.168.0.34
xx:xx:xx:xx:xx:xx <---------> 192.168.0.12
xx:xx:xx:xx:xx:xx <---------> 192.168.0.11
xx:xx:xx:xx:xx:xx <---------> 192.168.0.14
- To return as data
"[
('xx:xx:xx:xx:xx:xx', '192.168.0.1'),
('xx:xx:xx:xx:xx:xx', '192.168.0.34'),
('xx:xx:xx:xx:xx:xx', '192.168.0.12'),
('xx:xx:xx:xx:xx:xx', '192.168.0.11'),
('xx:xx:xx:xx:xx:xx', '192.168.0.14')
]"
- Refactoring ‒ see #2
- To check whether user is root ‒ see Arp-tools/arp-scan.py at master · s3bap3/Arp-tools
- When he is working as module
- When he is working as command
- python-nmap