LAN Attacker (Standalone no need installation) is a program that can scan,attack,detect and protect computers on local area network.
The features as following:
1.1 Scan
It can scan and show the active hosts on the LAN within a very short time (~2-3 seconds).
It has two scan mode, one is normal scanning, the other is antisniff scanning. The later is to find who is sniffing on the lan.
It can save and load computer list file.
It can scan the Lan regularly for new computer list.
It can update the computer list in passive mode using sniffing technology, that is, it can update the computer list from the sender's address of arp request packets without scanning the lan.
It can perform advanced scanning when you open advanced scanning dialg on menu.
It can scan a B class ip range in advanced scan dialg.
It can scan acthost listed in event listview.
It can scan and show the active hosts on the LAN within a very short time (~2-3 seconds).
It has two scan mode, one is normal scanning, the other is antisniff scanning. The later is to find who is sniffing on the lan.
It can save and load computer list file.
It can scan the Lan regularly for new computer list.
It can update the computer list in passive mode using sniffing technology, that is, it can update the computer list from the sender's address of arp request packets without scanning the lan.
It can perform advanced scanning when you open advanced scanning dialg on menu.
It can scan a B class ip range in advanced scan dialg.
It can scan acthost listed in event listview.
1.2 Attack
It can pull and collect all the packets on the LAN.
It can perform six attacking actions as following:
(1) Arp Flood - Send ip conflict packets to target computers as fast as possible, if you send too much, the target computers will down. :-(
(2) BanGateway - Tell the gateway a wrong mac address of target computers, so the targets can't receive packet from the internet. This attack is to forbid the targets access the internet.
(3) IPConflict - Like Arp Flood, send ip conflict packets to target computers regularly, maybe the users can't work because of regular ip conflict message. what's more, the targets can't access the lan.
(4) SniffGateway - Spoof the targets and the gateway, you can use sniffer to collect packets between them.
(5) SniffHosts - Spoof among two or above targets, you can use sniffer to collect packets among all of them. (dangerous!!!!)
(6) SniffLan - Just like SniffGateway, the difference is that SniffLan sends broadcast arp packets to tell all computers on the lan that this host is just the gateway, So you can sniff all the data between all hosts with the gateway.(dangerous!!!!!!!!!!!!!!)
While spoofing ARP tables, it can act as another gateway (or ip-forwarder) without other users' recognition on the LAN.
It can collect and forward packets through WinArpAttacker's ipforward function, you had best check disable system ipforward function because WinArpAttacker can do well.
All data sniffed by spoofing and forwarded by WinArpAttacker ipforward function will be counted, as you can see on main interface.
As your wish, the arp table is recovered automatically in a little time (about 5 seconds). Your also can select not to recover.
It can pull and collect all the packets on the LAN.
It can perform six attacking actions as following:
(1) Arp Flood - Send ip conflict packets to target computers as fast as possible, if you send too much, the target computers will down. :-(
(2) BanGateway - Tell the gateway a wrong mac address of target computers, so the targets can't receive packet from the internet. This attack is to forbid the targets access the internet.
(3) IPConflict - Like Arp Flood, send ip conflict packets to target computers regularly, maybe the users can't work because of regular ip conflict message. what's more, the targets can't access the lan.
(4) SniffGateway - Spoof the targets and the gateway, you can use sniffer to collect packets between them.
(5) SniffHosts - Spoof among two or above targets, you can use sniffer to collect packets among all of them. (dangerous!!!!)
(6) SniffLan - Just like SniffGateway, the difference is that SniffLan sends broadcast arp packets to tell all computers on the lan that this host is just the gateway, So you can sniff all the data between all hosts with the gateway.(dangerous!!!!!!!!!!!!!!)
While spoofing ARP tables, it can act as another gateway (or ip-forwarder) without other users' recognition on the LAN.
It can collect and forward packets through WinArpAttacker's ipforward function, you had best check disable system ipforward function because WinArpAttacker can do well.
All data sniffed by spoofing and forwarded by WinArpAttacker ipforward function will be counted, as you can see on main interface.
As your wish, the arp table is recovered automatically in a little time (about 5 seconds). Your also can select not to recover.
1.3 Detect
What is the most important function, it can detect almost all attacking actions metioned as above as well as host status. the event WinArpAttacker can detect is listed as following:
SrcMac_Mismath - Host sent an arp packet, its src_mac doesn't match,so the packet will be ignored.
DstMac_Mismath - Host recv an arp packet, its dst_mac doesn't match,so the packet will be ignored.
Arp_Scan - Host is scanning the lan by arp request for a hosts list.
Arp_Antisniff_Scan - Host is scanning the lan for sniffing host,thus the scanner can know who is sniffing.
Host_Online - Host is online now.
Host_Modify_IP - Host modified its ip to or added a new IP.
Host_Modify_MAC - Host modified its mac address.
New_Host - New gost was found.
Host_Add_IP - Host added a new ip address.
Multi_IP_Host - Host has multi-ip addresses.
Multi_Mac_Host - Host has multi-mac addresses.
Attack_Flood - Host sends a lot of arp packets to another host ,so the target computer maybe slow down.
Attack_Spoof - Host sends special arp packets to sniff the data two targets , so the victims' data exposed.
Attack_Spoof_Lan - Host lets all host on the lan believe that it's just a gateway, so the intruder can sniff all hosts' data to the real gateway.
Attack_Spoof_Ban_Access - Host told host that host has a inexist mac,so the targets can't communicate with each other.
Attack_Spoof_Ban_Access_GW - Host told host that the gateway has a inexist mac, so the target can't access the internet through the gateway.
Attack_Spoof_Ban_Access_Lan - Host broadcast host's mac as a inexist mac, so the target can't communicate with all hosts on the lan.
Attack_IP_Conflict - Host found another host has same ip as its, so the target would be disturbed by ip conflict messages.
Local_Arp_Entry_Change - now WinArpAttacker can watch local arp entry, when a host's mac address in local arp table is changed, WinArpAttacker can report.
Local_Arp_Entry_Add - When a mac address of a host is added to local arp table, WinArpAttacker can report.
It can explain each event which WinArpAttacker detected.
It can save events to file.
What is the most important function, it can detect almost all attacking actions metioned as above as well as host status. the event WinArpAttacker can detect is listed as following:
SrcMac_Mismath - Host sent an arp packet, its src_mac doesn't match,so the packet will be ignored.
DstMac_Mismath - Host recv an arp packet, its dst_mac doesn't match,so the packet will be ignored.
Arp_Scan - Host is scanning the lan by arp request for a hosts list.
Arp_Antisniff_Scan - Host is scanning the lan for sniffing host,thus the scanner can know who is sniffing.
Host_Online - Host is online now.
Host_Modify_IP - Host modified its ip to or added a new IP.
Host_Modify_MAC - Host modified its mac address.
New_Host - New gost was found.
Host_Add_IP - Host added a new ip address.
Multi_IP_Host - Host has multi-ip addresses.
Multi_Mac_Host - Host has multi-mac addresses.
Attack_Flood - Host sends a lot of arp packets to another host ,so the target computer maybe slow down.
Attack_Spoof - Host sends special arp packets to sniff the data two targets , so the victims' data exposed.
Attack_Spoof_Lan - Host lets all host on the lan believe that it's just a gateway, so the intruder can sniff all hosts' data to the real gateway.
Attack_Spoof_Ban_Access - Host told host that host has a inexist mac,so the targets can't communicate with each other.
Attack_Spoof_Ban_Access_GW - Host told host that the gateway has a inexist mac, so the target can't access the internet through the gateway.
Attack_Spoof_Ban_Access_Lan - Host broadcast host's mac as a inexist mac, so the target can't communicate with all hosts on the lan.
Attack_IP_Conflict - Host found another host has same ip as its, so the target would be disturbed by ip conflict messages.
Local_Arp_Entry_Change - now WinArpAttacker can watch local arp entry, when a host's mac address in local arp table is changed, WinArpAttacker can report.
Local_Arp_Entry_Add - When a mac address of a host is added to local arp table, WinArpAttacker can report.
It can explain each event which WinArpAttacker detected.
It can save events to file.
1.4 Protect
Support arp table protect. when WinArpAttacker detects local or remote host's is being arp-spoofing, it will recover local or remote host's arp tables as you wish.
Support arp table protect. when WinArpAttacker detects local or remote host's is being arp-spoofing, it will recover local or remote host's arp tables as you wish.
1.5 Proxy Arp
When hosts on your lan request other hosts' mac address, WinArpAttacker will tell it a certain mac address as you wish.
It aims to realize accessing the internet without changing your ip on a new lan, but it also can make your lan in a big mass if you assign a wrong mac address.
When hosts on your lan request other hosts' mac address, WinArpAttacker will tell it a certain mac address as you wish.
It aims to realize accessing the internet without changing your ip on a new lan, but it also can make your lan in a big mass if you assign a wrong mac address.
1.6 Save arp packets
It can save all sniffed arp packets to file.
It can save all sniffed arp packets to file.
1.7 other features.
Support multi-network adapter and multi-ip address and multi-gateway on a computer, you can select different adapter and ip address to scan different lan.
Support DHCP and fixed ip address.
Count all the arp packets for each host, including sent and recieved arp packets.
Support multi-network adapter and multi-ip address and multi-gateway on a computer, you can select different adapter and ip address to scan different lan.
Support DHCP and fixed ip address.
Count all the arp packets for each host, including sent and recieved arp packets.
Arp R/S Q/P
Action(Recive/Send) Arp packets type(ReQuest/RePly)
ArpRQ meaning: The number of arp request packets recieved
ArpRP meaning: The number of arp reply packets recieved
ArpSQ meaning: The number or arp request packets sent
ArpSP meaning: The number or arp reply packets sent
Action(Recive/Send) Arp packets type(ReQuest/RePly)
ArpRQ meaning: The number of arp request packets recieved
ArpRP meaning: The number of arp reply packets recieved
ArpSQ meaning: The number or arp request packets sent
ArpSP meaning: The number or arp reply packets sent
2. System Requirement.
Local : Windows XP/2000/2003/vista all version
Remote : All computers including network devices
WinPcap driver lastest must be needed ( all ready inside rar)
Remote : All computers including network devices
WinPcap driver lastest must be needed ( all ready inside rar)
3. What's New
It can scan a large ip range for online hosts by advanced scanning mode.
It can protect local and reomte hosts from arp-spoofing.
It can enable proxy arp, act as a arp proxy.
It can save all sniffed arp packets to file.
It can protect local and reomte hosts from arp-spoofing.
It can enable proxy arp, act as a arp proxy.
It can save all sniffed arp packets to file.
4. Getting Started
Firtly, install the latest WinPcap driver (Already in rar files)
second, just run LAN Attacker (Standalone no need instalation)
click scan button and start button
look at arp information on remote computer with "arp -a"
to stop attack, click stop button.
to select adapter or ip address, click options button.
to modify attacking setup, click options button.
If there are many active hosts (more than 50) and the real gateway may be down on LAN.
second, just run LAN Attacker (Standalone no need instalation)
click scan button and start button
look at arp information on remote computer with "arp -a"
to stop attack, click stop button.
to select adapter or ip address, click options button.
to modify attacking setup, click options button.
If there are many active hosts (more than 50) and the real gateway may be down on LAN.
Get LAN Attacker 2009 v3.5 [>>]