Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

This is the first of a line of scanning calling itself arping.. Arping is using ngrok as a sudo causing ping for geo locating a established specific server or ap ( access point) to determine if the user or system is vulnerable to the arp-method used by aircrack-ng. If specified servers and or ap's are vulnerable. Said program script will execute bash. File with script embedded in file which is hidden in jpeg format .. The commit to this thread is to determine if a system is vulnerable to this type of arp attack ... My guess is over half of the security companies are not aware of this exploit. 1# ( Bash ./ arping=set module to= true.) 2# )Bash=verbose output# ./ ) #41

Open
aku35 opened this issue Jul 17, 2022 · 0 comments

Comments

@aku35
Copy link

aku35 commented Jul 17, 2022

Try it yourself

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant