Convert Figma logo to code with AI

royhills logoarp-scan

The ARP Scanner

1,055
154
1,055
23

Top Related Projects

10,467

Nmap - the Network Mapper. Github mirror of official SVN repository.

24,225

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

17,391

The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.

11,012

Scapy: the Python-based interactive packet manipulation program & library.

A Swiss army knife for your daily Linux network plumbing.

5,606

ZMap is a fast single packet network scanner designed for Internet-wide network surveys.

Quick Overview

arp-scan is a command-line tool for discovering and fingerprinting IP hosts on a local network using ARP requests. It sends ARP packets to hosts on the local network and displays any responses that are received, providing detailed information about the responding hosts.

Pros

  • Fast and efficient network scanning
  • Provides detailed information about discovered hosts
  • Works on various operating systems (Linux, BSD, macOS, Windows)
  • Highly customizable with numerous options for fine-tuning scans

Cons

  • Limited to local network scanning (cannot scan remote networks)
  • Requires root/administrator privileges to run
  • May trigger security alerts on some networks
  • Learning curve for advanced features and options

Code Examples

As arp-scan is a command-line tool rather than a code library, there are no code examples to provide. Instead, here are some example command-line usage scenarios:

# Basic scan of the local network
sudo arp-scan --localnet

# Scan a specific IP range
sudo arp-scan 192.168.1.0/24

# Scan with custom MAC vendor file
sudo arp-scan --localnet --macfile=/path/to/custom/mac/file

Getting Started

To get started with arp-scan:

  1. Install arp-scan on your system:

    • On Ubuntu/Debian: sudo apt-get install arp-scan
    • On macOS with Homebrew: brew install arp-scan
    • For other systems, check the project's GitHub page for installation instructions
  2. Run a basic scan of your local network:

    sudo arp-scan --localnet
    
  3. Explore additional options and features by reading the man page:

    man arp-scan
    

For more detailed information and advanced usage, refer to the project's documentation on GitHub.

Competitor Comparisons

10,467

Nmap - the Network Mapper. Github mirror of official SVN repository.

Pros of Nmap

  • More comprehensive network scanning and discovery capabilities
  • Extensive scripting engine for customized scans and vulnerability checks
  • Cross-platform support (Windows, macOS, Linux)

Cons of Nmap

  • Steeper learning curve due to its extensive feature set
  • Can be slower for simple network discovery tasks
  • May trigger security alerts or be blocked by firewalls

Code Comparison

arp-scan (simple ARP scan):

sudo arp-scan --localnet

Nmap (ARP scan equivalent):

sudo nmap -sn -PR 192.168.1.0/24

Key Differences

  • arp-scan focuses specifically on ARP-based network discovery
  • Nmap offers a wider range of scanning techniques and protocols
  • arp-scan is generally faster for simple LAN host discovery
  • Nmap provides more detailed information about discovered hosts

Use Cases

arp-scan:

  • Quick LAN host discovery
  • Simple network inventory

Nmap:

  • Comprehensive network mapping
  • Security auditing and vulnerability scanning
  • Service and OS detection

Both tools have their strengths, with arp-scan excelling in simplicity and speed for ARP-based discovery, while Nmap offers a more robust and versatile scanning solution for various network analysis tasks.

24,225

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

Pros of masscan

  • Significantly faster scanning speed, capable of scanning the entire Internet in under 6 minutes
  • Supports a wider range of protocols and scan types, including TCP SYN scanning and banner grabbing
  • More flexible and customizable, allowing for complex scan configurations

Cons of masscan

  • Higher complexity and steeper learning curve compared to arp-scan
  • May generate more network traffic and potentially trigger intrusion detection systems
  • Less focused on local network discovery, which is arp-scan's primary strength

Code Comparison

arp-scan (simple ARP scan):

sudo arp-scan --localnet

masscan (equivalent scan):

sudo masscan --range 192.168.0.0/24 --ping

Both tools can perform basic network scans, but masscan offers more advanced features:

sudo masscan -p1-65535 10.0.0.0/8 --rate=10000

This masscan command scans all ports on a large network at high speed, demonstrating its capability for more comprehensive scans compared to arp-scan's focused approach on ARP-based discovery.

17,391

The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.

Pros of bettercap

  • More comprehensive network attack and monitoring tool
  • Supports multiple protocols and attack vectors
  • Modular architecture with extensible plugins

Cons of bettercap

  • Larger codebase and more complex to use
  • Requires more system resources
  • May be overkill for simple ARP scanning tasks

Code comparison

arp-scan (C):

for (i=0; i<num_hosts; i++) {
   arp_send(pcap_handle, &frame_hdr, &arp_pkt, packet_out, packet_out_len);
   timeout = timeval_diff(&current_time, &last_packet_time);
   if (timeout < interval) {
      usleep(interval - timeout);
   }
}

bettercap (Go):

for _, addr := range addresses {
    if err, pkt := packets.NewARPRequest(iface.IP, iface.HW, addr, nil); err != nil {
        return err
    } else {
        if err := p.Session.Queue.Send(pkt); err != nil {
            return err
        }
    }
}

Both tools implement ARP scanning, but bettercap offers a more extensive feature set within a larger framework. arp-scan is focused solely on ARP scanning, making it simpler and more lightweight for specific use cases.

11,012

Scapy: the Python-based interactive packet manipulation program & library.

Pros of Scapy

  • More versatile: Scapy is a powerful packet manipulation tool that can handle various protocols beyond ARP
  • Extensible: Allows creation of custom protocols and packet types
  • Interactive: Provides an interactive shell for packet crafting and analysis

Cons of Scapy

  • Steeper learning curve: Requires more programming knowledge to use effectively
  • Slower execution: Generally slower for large-scale scans compared to arp-scan
  • Larger footprint: Requires more system resources and dependencies

Code Comparison

arp-scan (C):

arp_packet = forge_arp_packet(source_ip, target_ip);
send_packet(arp_packet);

Scapy (Python):

arp_request = ARP(pdst=target_ip)
ether_frame = Ether(dst="ff:ff:ff:ff:ff:ff")
packet = ether_frame/arp_request
srp(packet, timeout=2, verbose=False)

Both tools can perform ARP scans, but Scapy offers more flexibility in packet crafting and manipulation. arp-scan is more focused and optimized for ARP scanning, while Scapy provides a broader range of networking capabilities. arp-scan is generally faster and more efficient for large-scale ARP scans, while Scapy excels in scenarios requiring complex packet manipulation or analysis across multiple protocols.

A Swiss army knife for your daily Linux network plumbing.

Pros of netsniff-ng

  • More comprehensive networking toolkit with multiple tools
  • Higher performance due to zero-copy packet processing
  • Supports advanced packet filtering and manipulation

Cons of netsniff-ng

  • More complex to use and configure
  • Requires root privileges for most operations
  • Larger codebase and dependencies

Code Comparison

netsniff-ng (packet capture example):

struct ring rx_ring;
setup_rx_ring(&rx_ring, ifname);
while (likely(!sigint)) {
    frame = get_next_frame(&rx_ring);
    process_frame(frame);
}

arp-scan (ARP packet creation):

arp_packet = (arp_ether_ipv4 *) (packet + sizeof(ether_hdr));
arp_packet->ar_hrd = htons(ARPHRD_ETHER);
arp_packet->ar_pro = htons(ETH_P_IP);
arp_packet->ar_hln = ETH_ALEN;
arp_packet->ar_pln = 4;

netsniff-ng offers a more comprehensive networking toolkit with higher performance, while arp-scan focuses specifically on ARP scanning with a simpler interface. netsniff-ng is more powerful but complex, whereas arp-scan is easier to use for its specific purpose.

5,606

ZMap is a fast single packet network scanner designed for Internet-wide network surveys.

Pros of zmap

  • Significantly faster scanning speed, capable of scanning the entire IPv4 address space in under 45 minutes
  • More versatile, supporting various protocols beyond ARP (e.g., ICMP, TCP SYN)
  • Designed for large-scale internet-wide scanning

Cons of zmap

  • More complex setup and usage compared to arp-scan
  • Requires root privileges to run effectively
  • May be overkill for simple local network scanning tasks

Code comparison

arp-scan (simple ARP scan):

sudo arp-scan --localnet

zmap (TCP SYN scan on port 80):

sudo zmap -p 80 192.168.1.0/24

Key differences

arp-scan is focused on ARP-based local network scanning, making it simpler and more straightforward for basic network discovery tasks. zmap, on the other hand, is a more powerful and versatile tool designed for large-scale internet scanning across multiple protocols.

arp-scan is ideal for quick local network enumeration, while zmap excels in scenarios requiring high-speed, wide-scale network scanning and research. The choice between the two depends on the specific use case, with arp-scan being more suitable for everyday network administration tasks and zmap for more advanced network research and security assessments.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

arp-scan

Build Coverage Status CodeQL


About

arp-scan is a network scanning tool that uses the ARP protocol to discover and fingerprint IPv4 hosts on the local network. It is available for Linux, BSD, macOS and Solaris under the GPLv3 licence.

This is README.md for arp-scan version 1.10.1-git.

Installation

Building and Installing from Source

arp-scan uses the GNU automake and autoconf tools. The installation process from the latest github source is:

  • git clone https://github.com/royhills/arp-scan.git to obtain the latest source code.
  • cd arp-scan to enter the source code directory.
  • autoreconf --install to generate a configure file (if you don't have autoreconf you can download a tarball instead as detailed below).
  • ./configure to create a makefile for your system (see configuration options below).
  • make to build the project.
  • Optionally make check to verify that everything works as expected.
  • make install to install (you'll need to be root or use sudo/doas for this part).

You will need these development tools and libraries:

  • GNU automake and autoconf (if you don't have these, you can download the latest tarball which includes configure instead: arp-scan-1.10.0.tar.gz). Note that this might not be as up to date as the latest github development version.
  • The make utility (tested with BSD make and GNU make).
  • A C compiler (tested on gcc and clang, should work on any C compiler that supports C99).
  • Libraries and include files for libpcap version 1.5 or later. All modern distros have a binary package, some split the package into libpcap runtime and libpcap-dev or libpcap-devel development packages, in which case you need to install the development version to build.
  • libcap to build with POSIX.1e capabilities support on Linux. Most Linux distros come with runtime support by default and have a development package available. Linux has capabilities support since kernel version 2.6.24.

To run the Perl scripts arp-fingerprint and get-oui, you will also need the perl interpreter and the perl modules LWP::UserAgent and Text::CSV.

You can pass options to configure to control the build process. Run ./configure --help for a list of options. arp-scan has one package-specific configure option:

  • --with-libcap[=auto/yes/no] Build with libcap POSIX.1e capabilities support [default=auto]

    With auto, configure will enable capability support if the libcap library and headers are installed. Specifying --with-libcap will enable support and --without-libpcap will disable it.

arp-scan is known to build and run on:

  • Linux (should work on any distribution and all architectures).
  • FreeBSD
  • OpenBSD
  • NetBSD
  • DragonflyBSD
  • macOS
  • Solaris 10 (there are known problems with Solaris 11. If anyone cares please comment on issue #31).

It should be possible to build arp-scan on any OS that libpcap supports. If your OS supports libpcap but configure gives the error configure: error: Host operating system your-os-name is not supported please open an issue to request porting to your OS.

Installing from a Binary Package

Many distributions provide binary packages for arp-scan These won't be as up to date as the latest source on github and may not be as up to date as the latest release, but they are more convenient and will be kept up to date by the package manager. So using a binary package is often a good choice if you don't need the latest features.

If you have installed a binary package and wonder if there are useful new features on github, use arp-scan --version to check the version you have then see the NEWS and ChangeLog files on github for details of what's changed.

The details on how to install an arp-scan binary package depend on your distribution.

Installing from a BSD Port

If you are using a BSD operating system you may have the option of installing from a source ports collection as well as from a binary package.

Ports automate the building and installation of source code and manage updates like a binary package. They also give the flexibility of installing from source. A source port won't be as up to date as the latest github though, but it might sometimes be more up to date than the corresponding binary package.

The details on how to install an arp-scan source port depend on your distribution.

Documentation

For usage information use:

arp-scan --help

For detailed information, see the manual pages: arp-scan(1), arp-fingerprint(1), get-oui(1) and mac-vendor(5).

See the arp-scan wiki at https://github.com/royhills/arp-scan/wiki

See CONTRIBUTING.md if you are interested in contributing to arp-scan. If you think you have found a security vulnerability, please see SECURITY.md.

Notes for Package Maintainers

  • Please raise a github issue or create a pull request if you have any local patches that could be applicable upstream.
  • If you are building on Linux, please build with libcap POSIX.1e capabilities support if you can. You may need to install the libcap development headers as well as the libpcap development headers before running configure.
  • Note that Makefile.am contains an install-exec-hook that will install arp-scan with CAP_NET_RAW capabilities if it can, and failing that it will install it suid root.