Question: A student is working on the ARP cache poisoning lab to poison 1 0 . 0 . 2 . 1 2 9 ' s ARP

A student is working on the ARP cache poisoning lab to poison 10.0.2.129's ARP cache using the gratuitous ARP request. His goal is to put the following fake information to 10.0.2.129's cache.
10.0.2.128- aa.bb.cc.dd.ee.ff
Please help him to fill the seven blanks in the following Python script.
#!/usr/bin/python3
from scapy.all import *
VM_A_IP ='10.0.2.129'
VM_A_MAC ='00:0c:29:9d:ed:9c'
VICTIM_IP ='10.0.2.128'
FAKE_MAC ='aa:bb:cc:dd:ee:ff'
ether= Ether(src= blank1, dst= blank2)
arp=ARP(hwsrc= blank3, hwdst =blank4,psrc= blank5,pdst=blank6,op=blank7)
pkt =ether/arp
sendp (pkt)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!