Arbitrary ARP spoofing daemon

Edit 2015-11-16: I finally fixed this to work with current SCAPY. The latest code is available on GitHub.

Edit 2012-03-07: This no longer works with the latest release of SCAPY. I will provide a patched version "soon".

This package is a hack I put together to provide a modern replacement to arpcatch. From the README:

arpitraryd by Michael Fincham  
-----------------------------------------------------

This program re-implements the functionality of the ancient "arpcatch" daemon 
that's only available still in (some older?) releases of OpenBSD 
e.g <http://www.openbsd.org/4.6_packages/sh/arpcatch-19970824.tgz-long.html>

The configuration file format is thus:

	[global]
	iface=eth0 # the interface to listen on. will be put in to promiscuous 
		   # mode by SCAPY

	[mappings]
	192.0.2.1=ab:ab:ab:ab:ab:ab # define your mappings here in the 
	.....			    # form IP=MAC 

It's been running for several months on a small LAN (~100 machines) which had 
previously been served by an OpenBSD box running arpcatch.  Nothing has exploded 
yet, but you run this code at your own risk. This package is released in to 
the public domain.

This package depends on SCAPY <http://www.secdev.org/projects/scapy/>.
[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]arpitrary.tar2011-01-27 12:46 10K 
[   ]arpitrary.tar.gpg2011-01-27 12:46 2.5K 

Apache Server at finch.am Port 443