Skip to main content
Skip table of contents

How to Create a Custom Script/Task to Run Arp-Scan

ARP-Scan sends ARP packets to hosts on the local network and displays any responses that are received. Additional information about arp-scan may be found at http://linux.die.net/man/1/arp-scan

​The following custom script may be used to run arp-scan upon the local network subnet.

Steps for use:

  1. Login to Pwn Pulse, select Scripts from the main drop-down menu.
  2. Select Add a script, provide an indicative name (e.g. "Custom - ArpScan") and select Bash.
  3. In the scripting window, type the following lines and click the Save button.

    #!/bin/bash
    date
    arp-scan -l
  4. Next, select Tasks from the main drop-down menu, then select Add a task.
  5. On the New Task page, provide an indicative name for the task, for example  Run ArpScan, select the newly created script from the Script drop-down menu.
  6. For the Add to parameter, choose to run the task specific to a single sensor selected from the drop-down menu, or to a group of sensors.  
  7. Next, select a Start Time and choose a Frequency how often the task should be run (***).  Afterward, click the Save button.
  8. After the task has completed and assuming the targets were accessible at the time the task was run, the results of the task may be viewed by returning to the Tasks page, then selecting the Results button.

​​​​​Provided below is an example of what the Results of the task may look like:

Interface: eth0, datalink type: EN10MB (Ethernet)
Starting arp-scan 1.9 with 256 hosts (http://www.nta-monitor.com/tools/arp-scan/)
10.0.0.1    c4:27:95:5c:2c:35    Technicolor USA Inc.
10.0.0.8    c4:27:95:5c:2c:37    Technicolor USA Inc.
10.0.0.16    00:07:5c:44:11:a3    Eastman Kodak Company
10.0.0.17    00:90:a9:b9:5c:41    WESTERN DIGITAL
10.0.0.5    ac:22:0b:e4:37:80    ASUSTek COMPUTER INC.
10.0.0.6    8c:a9:82:b1:6d:a6    Intel Corporate
10.0.0.11    f8:a9:d0:0d:79:48    (Unknown)
10.0.0.15    38:aa:3c:1d:52:bf    SAMSUNG ELECTRO-MECHANICS

8 packets received by filter, 0 packets dropped by kernel
Ending arp-scan 1.9: 256 hosts scanned in 3.006 seconds (85.16 hosts/sec). 8 responded




Copyright

© 2024 Outpost24® All rights reserved. This document may only be redistributed unedited and unaltered. This document may be cited and referenced only if clearly crediting Outpost24® and this document as the source. Any other reproduction and redistribution in print or electronically is strictly prohibited without explicit permission.

Trademark

Outpost24® and OUTSCAN™ are trademarks of Outpost24® and its affiliated companies. All other brand names, product names or trademarks belong to their respective owners.


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.