/arp-scan

The ARP Scanner

Primary LanguageCGNU General Public License v3.0GPL-3.0

arp-scan

Build Status Coverage Status

The ARP scanner

Table of Contents

Installation

arp-scan uses the standard GNU automake and autoconf tools, so the typical installation process is:

  • Run git clone https://github.com/royhills/arp-scan.git to obtain the project source code
  • Run cd arp-scan to enter source directory
  • Run autoreconf --install to generate a viable ./configure file
  • Run ./configure to generate a makefile for your system
  • Run make to build the project
  • Optionally run make check to verify that everything works as expected
  • Run make install to install (you'll need root or sudo for this part)

You will need GNU automake and autoconf, the make utility, an ANSI C compiler (for example gcc or clang), the development header files and libraries, and libpcap version 0.9 or later.

If you want to run the Perl scripts arp-fingerprint, get-oui and get-iab, you will need to have the Perl interpreter installed. These scripts were tested on Perl 5.8 and 5.10, but will probably run on other versions of Perl 5 as well. In addition, for get-oui and get-iab, you will need the LWP::UserAgent Perl module.

You can pass various options to "configure" to control the build and installation process. See the file INSTALL for more details.

arp-scan is known to compile and run on the following platforms:

  • Linux
  • FreeBSD
  • OpenBSD
  • NetBSD
  • DragonflyBSD
  • MacOS X
  • Solaris

All platforms use libpcap (http://www.tcpdump.org/) to send the ARP packets and receive the responses.

The only peice of the code that is implementation-specific is the function to obtain the interface MAC address. This uses Packet Socket on Linux, BPF on BSD and DLPI on Solaris.

Documentation

The primary source of documentation is the arp-scan wiki at http://www.nta-monitor.com/wiki/

For usage information, including details of all the options, use:

arp-scan --help

For more detailed documentation, see the manual pages: arp-scan(1), arp-fingerprint(1), get-iab(1), get-oui(1) and mac-vendor(5).