Score:0

Packet capturing using arp poisoning and IP forwarding

mv flag

I made a script in Golang that allows me to perform ARP poisoning attack and with that I enabled IP forwarding to forward the packets to my router. When I use pcap.OpenLive I can only see the packets from the attacked device to the router. For example, if I go to www.example.com I can see the request from the device to the site but not the other case. What can I do to capture those packets?

    handle, err := pcap.OpenLive(iface.Name, 1024, true, pcap.BlockForever)
    if err != nil {
        return err
    }
    defer handle.Close()
    src := gopacket.NewPacketSource(handle, layers.LayerTypeEthernet)
    if err != nil {
        log.Fatal(err)
    }
    for packet := range src.Packets() {
       layer := packet.Layer(layers.LayerTypeIPv4)
        if layer == nil {
            continue
        }
        IPv4Layer, ok := layer.(*layers.IPv4)
        if !ok {
            continue
        }
         ................. more code here
     }
I sit in a Tesla and translated this thread with Ai:

mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.