Top Related Projects
Nmap - the Network Mapper. Github mirror of official SVN repository.
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Scapy: the Python-based interactive packet manipulation program & library.
A Swiss army knife for your daily Linux network plumbing.
ZMap is a fast single packet network scanner designed for Internet-wide network surveys.
Quick Overview
arp-scan is a command-line tool for discovering and fingerprinting IP hosts on a local network using ARP requests. It sends ARP packets to hosts on the local network and displays any responses that are received, providing detailed information about the responding hosts.
Pros
- Fast and efficient network scanning
- Provides detailed information about discovered hosts
- Works on various operating systems (Linux, BSD, macOS, Windows)
- Highly customizable with numerous options for fine-tuning scans
Cons
- Limited to local network scanning (cannot scan remote networks)
- Requires root/administrator privileges to run
- May trigger security alerts on some networks
- Learning curve for advanced features and options
Code Examples
As arp-scan is a command-line tool rather than a code library, there are no code examples to provide. Instead, here are some example command-line usage scenarios:
# Basic scan of the local network
sudo arp-scan --localnet
# Scan a specific IP range
sudo arp-scan 192.168.1.0/24
# Scan with custom MAC vendor file
sudo arp-scan --localnet --macfile=/path/to/custom/mac/file
Getting Started
To get started with arp-scan:
-
Install arp-scan on your system:
- On Ubuntu/Debian:
sudo apt-get install arp-scan
- On macOS with Homebrew:
brew install arp-scan
- For other systems, check the project's GitHub page for installation instructions
- On Ubuntu/Debian:
-
Run a basic scan of your local network:
sudo arp-scan --localnet
-
Explore additional options and features by reading the man page:
man arp-scan
For more detailed information and advanced usage, refer to the project's documentation on GitHub.
Competitor Comparisons
Nmap - the Network Mapper. Github mirror of official SVN repository.
Pros of Nmap
- More comprehensive network scanning and discovery capabilities
- Extensive scripting engine for customized scans and vulnerability checks
- Cross-platform support (Windows, macOS, Linux)
Cons of Nmap
- Steeper learning curve due to its extensive feature set
- Can be slower for simple network discovery tasks
- May trigger security alerts or be blocked by firewalls
Code Comparison
arp-scan (simple ARP scan):
sudo arp-scan --localnet
Nmap (ARP scan equivalent):
sudo nmap -sn -PR 192.168.1.0/24
Key Differences
- arp-scan focuses specifically on ARP-based network discovery
- Nmap offers a wider range of scanning techniques and protocols
- arp-scan is generally faster for simple LAN host discovery
- Nmap provides more detailed information about discovered hosts
Use Cases
arp-scan:
- Quick LAN host discovery
- Simple network inventory
Nmap:
- Comprehensive network mapping
- Security auditing and vulnerability scanning
- Service and OS detection
Both tools have their strengths, with arp-scan excelling in simplicity and speed for ARP-based discovery, while Nmap offers a more robust and versatile scanning solution for various network analysis tasks.
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
Pros of masscan
- Significantly faster scanning speed, capable of scanning the entire Internet in under 6 minutes
- Supports a wider range of protocols and scan types, including TCP SYN scanning and banner grabbing
- More flexible and customizable, allowing for complex scan configurations
Cons of masscan
- Higher complexity and steeper learning curve compared to arp-scan
- May generate more network traffic and potentially trigger intrusion detection systems
- Less focused on local network discovery, which is arp-scan's primary strength
Code Comparison
arp-scan (simple ARP scan):
sudo arp-scan --localnet
masscan (equivalent scan):
sudo masscan --range 192.168.0.0/24 --ping
Both tools can perform basic network scans, but masscan offers more advanced features:
sudo masscan -p1-65535 10.0.0.0/8 --rate=10000
This masscan command scans all ports on a large network at high speed, demonstrating its capability for more comprehensive scans compared to arp-scan's focused approach on ARP-based discovery.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Pros of bettercap
- More comprehensive network attack and monitoring tool
- Supports multiple protocols and attack vectors
- Modular architecture with extensible plugins
Cons of bettercap
- Larger codebase and more complex to use
- Requires more system resources
- May be overkill for simple ARP scanning tasks
Code comparison
arp-scan (C):
for (i=0; i<num_hosts; i++) {
arp_send(pcap_handle, &frame_hdr, &arp_pkt, packet_out, packet_out_len);
timeout = timeval_diff(¤t_time, &last_packet_time);
if (timeout < interval) {
usleep(interval - timeout);
}
}
bettercap (Go):
for _, addr := range addresses {
if err, pkt := packets.NewARPRequest(iface.IP, iface.HW, addr, nil); err != nil {
return err
} else {
if err := p.Session.Queue.Send(pkt); err != nil {
return err
}
}
}
Both tools implement ARP scanning, but bettercap offers a more extensive feature set within a larger framework. arp-scan is focused solely on ARP scanning, making it simpler and more lightweight for specific use cases.
Scapy: the Python-based interactive packet manipulation program & library.
Pros of Scapy
- More versatile: Scapy is a powerful packet manipulation tool that can handle various protocols beyond ARP
- Extensible: Allows creation of custom protocols and packet types
- Interactive: Provides an interactive shell for packet crafting and analysis
Cons of Scapy
- Steeper learning curve: Requires more programming knowledge to use effectively
- Slower execution: Generally slower for large-scale scans compared to arp-scan
- Larger footprint: Requires more system resources and dependencies
Code Comparison
arp-scan (C):
arp_packet = forge_arp_packet(source_ip, target_ip);
send_packet(arp_packet);
Scapy (Python):
arp_request = ARP(pdst=target_ip)
ether_frame = Ether(dst="ff:ff:ff:ff:ff:ff")
packet = ether_frame/arp_request
srp(packet, timeout=2, verbose=False)
Both tools can perform ARP scans, but Scapy offers more flexibility in packet crafting and manipulation. arp-scan is more focused and optimized for ARP scanning, while Scapy provides a broader range of networking capabilities. arp-scan is generally faster and more efficient for large-scale ARP scans, while Scapy excels in scenarios requiring complex packet manipulation or analysis across multiple protocols.
A Swiss army knife for your daily Linux network plumbing.
Pros of netsniff-ng
- More comprehensive networking toolkit with multiple tools
- Higher performance due to zero-copy packet processing
- Supports advanced packet filtering and manipulation
Cons of netsniff-ng
- More complex to use and configure
- Requires root privileges for most operations
- Larger codebase and dependencies
Code Comparison
netsniff-ng (packet capture example):
struct ring rx_ring;
setup_rx_ring(&rx_ring, ifname);
while (likely(!sigint)) {
frame = get_next_frame(&rx_ring);
process_frame(frame);
}
arp-scan (ARP packet creation):
arp_packet = (arp_ether_ipv4 *) (packet + sizeof(ether_hdr));
arp_packet->ar_hrd = htons(ARPHRD_ETHER);
arp_packet->ar_pro = htons(ETH_P_IP);
arp_packet->ar_hln = ETH_ALEN;
arp_packet->ar_pln = 4;
netsniff-ng offers a more comprehensive networking toolkit with higher performance, while arp-scan focuses specifically on ARP scanning with a simpler interface. netsniff-ng is more powerful but complex, whereas arp-scan is easier to use for its specific purpose.
ZMap is a fast single packet network scanner designed for Internet-wide network surveys.
Pros of zmap
- Significantly faster scanning speed, capable of scanning the entire IPv4 address space in under 45 minutes
- More versatile, supporting various protocols beyond ARP (e.g., ICMP, TCP SYN)
- Designed for large-scale internet-wide scanning
Cons of zmap
- More complex setup and usage compared to arp-scan
- Requires root privileges to run effectively
- May be overkill for simple local network scanning tasks
Code comparison
arp-scan (simple ARP scan):
sudo arp-scan --localnet
zmap (TCP SYN scan on port 80):
sudo zmap -p 80 192.168.1.0/24
Key differences
arp-scan is focused on ARP-based local network scanning, making it simpler and more straightforward for basic network discovery tasks. zmap, on the other hand, is a more powerful and versatile tool designed for large-scale internet scanning across multiple protocols.
arp-scan is ideal for quick local network enumeration, while zmap excels in scenarios requiring high-speed, wide-scale network scanning and research. The choice between the two depends on the specific use case, with arp-scan being more suitable for everyday network administration tasks and zmap for more advanced network research and security assessments.
Convert
designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
arp-scan
About
arp-scan is a network scanning tool that uses the ARP protocol to discover and fingerprint IPv4 hosts on the local network. It is available for Linux, BSD, macOS and Solaris under the GPLv3 licence.
This is README.md
for arp-scan version 1.10.1-git
.
Installation
Building and Installing from Source
arp-scan uses the GNU automake and autoconf tools. The installation process from the latest github source is:
git clone https://github.com/royhills/arp-scan.git
to obtain the latest source code.cd arp-scan
to enter the source code directory.autoreconf --install
to generate a configure file (if you don't haveautoreconf
you can download a tarball instead as detailed below)../configure
to create a makefile for your system (see configuration options below).make
to build the project.- Optionally
make check
to verify that everything works as expected. make install
to install (you'll need to be root or use sudo/doas for this part).
You will need these development tools and libraries:
- GNU automake and autoconf (if you don't have these, you can download the latest tarball which includes
configure
instead: arp-scan-1.10.0.tar.gz). Note that this might not be as up to date as the latest github development version. - The make utility (tested with BSD make and GNU make).
- A C compiler (tested on gcc and clang, should work on any C compiler that supports C99).
- Libraries and include files for libpcap version 1.5 or later. All modern distros have a binary package, some split the package into
libpcap
runtime andlibpcap-dev
orlibpcap-devel
development packages, in which case you need to install the development version to build. - libcap to build with POSIX.1e capabilities support on Linux. Most Linux distros come with runtime support by default and have a development package available. Linux has capabilities support since kernel version
2.6.24
.
To run the Perl scripts arp-fingerprint
and get-oui
, you will also need the perl interpreter and the perl modules LWP::UserAgent
and Text::CSV
.
You can pass options to configure
to control the build process. Run ./configure --help
for a list of options. arp-scan has one package-specific configure option:
-
--with-libcap[=auto/yes/no]
Build with libcap POSIX.1e capabilities support [default=auto
]With
auto
, configure will enable capability support if thelibcap
library and headers are installed. Specifying--with-libcap
will enable support and--without-libpcap
will disable it.
arp-scan is known to build and run on:
- Linux (should work on any distribution and all architectures).
- FreeBSD
- OpenBSD
- NetBSD
- DragonflyBSD
- macOS
- Solaris 10 (there are known problems with Solaris 11. If anyone cares please comment on issue #31).
It should be possible to build arp-scan on any OS that libpcap supports. If your OS supports libpcap but configure gives the error configure: error: Host operating system your-os-name is not supported
please open an issue to request porting to your OS.
Installing from a Binary Package
Many distributions provide binary packages for arp-scan These won't be as up to date as the latest source on github and may not be as up to date as the latest release, but they are more convenient and will be kept up to date by the package manager. So using a binary package is often a good choice if you don't need the latest features.
If you have installed a binary package and wonder if there are useful new features on github, use arp-scan --version
to check the version you have then see the NEWS and ChangeLog files on github for details of what's changed.
The details on how to install an arp-scan binary package depend on your distribution.
Installing from a BSD Port
If you are using a BSD operating system you may have the option of installing from a source ports collection as well as from a binary package.
Ports automate the building and installation of source code and manage updates like a binary package. They also give the flexibility of installing from source. A source port won't be as up to date as the latest github though, but it might sometimes be more up to date than the corresponding binary package.
The details on how to install an arp-scan source port depend on your distribution.
Documentation
For usage information use:
arp-scan --help
For detailed information, see the manual pages: arp-scan(1)
, arp-fingerprint(1)
, get-oui(1)
and mac-vendor(5)
.
See the arp-scan wiki at https://github.com/royhills/arp-scan/wiki
See CONTRIBUTING.md
if you are interested in contributing to arp-scan. If you think you have found a security vulnerability, please see SECURITY.md
.
Notes for Package Maintainers
- Please raise a github issue or create a pull request if you have any local patches that could be applicable upstream.
- If you are building on Linux, please build with
libcap
POSIX.1e capabilities support if you can. You may need to install thelibcap
development headers as well as thelibpcap
development headers before runningconfigure
. - Note that
Makefile.am
contains aninstall-exec-hook
that will install arp-scan withCAP_NET_RAW
capabilities if it can, and failing that it will install it suid root.
Top Related Projects
Nmap - the Network Mapper. Github mirror of official SVN repository.
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Scapy: the Python-based interactive packet manipulation program & library.
A Swiss army knife for your daily Linux network plumbing.
ZMap is a fast single packet network scanner designed for Internet-wide network surveys.
Convert
designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot