GSP
Quick Navigator

Search Site

Unix VPS
A - Starter
B - Basic
C - Preferred
D - Commercial
MPS - Dedicated
Previous VPSs
* Sign Up! *

Support
Contact Us
Online Help
Handbooks
Domain Status
Man Pages

FAQ
Virtual Servers
Pricing
Billing
Technical

Network
Facilities
Connectivity
Topology Map

Miscellaneous
Server Agreement
Year 2038
Credits
 

USA Flag

 

 

Man Pages
ARPSPOOF(8) FreeBSD System Manager's Manual ARPSPOOF(8)

arpspoof - intercept packets on a switched LAN


arpspoof [-i interface] [-t target]
  host


arpspoof redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies. This is an extremely effective way of sniffing traffic on a switch.

Kernel IP forwarding (or a userland program which accomplishes the same, e.g. fragrouter(8)) must be turned on ahead of time.

-i interface
Specify the interface to use.
-t target
Specify a particular host to ARP poison (if not specified, all hosts on the LAN).
host
Specify the host you wish to intercept packets for (usually the local gateway).

dsniff(8), fragrouter(8)

Dug Song <dugsong@monkey.org>

Search for    or go to Top of page |  Section 8 |  Main Index

Powered by GSP Visit the GSP FreeBSD Man Page Interface.
Output converted with ManDoc.