{% extends "base.html" %} {% block title %}Network Security - AUTARCH{% endblock %} {% block content %}
Connection analysis, intrusion detection, rogue device scanning, and real-time monitoring.
| Time | Protocol | Local | Remote | Process |
|---|
Scan for nearby WiFi networks. Shows SSIDs, BSSIDs, channels, signal strength, and security. Requires a wireless interface.
Scan for active attacks against your network: deauth floods, evil twin APs, WiFi Pineapple rogue APs, MITM/ARP poisoning, and SSL stripping.
Launch offensive WiFi tools for authorized penetration testing.
Scans your ARP table for poisoning indicators: IPs with multiple MACs, gateway MAC changes, and suspicious broadcast entries. Compares against your saved baseline.
arp_announce=2, arp_ignore=1, and rp_filter=1
to make the kernel reject suspicious ARP replies.
What is ARP Spoofing?
An attacker sends fake ARP (Address Resolution Protocol) replies to associate their MAC address
with the IP of another device (usually the gateway). This causes your traffic to route through
the attacker's machine instead of directly to the router — enabling eavesdropping, credential
theft, and session hijacking.
Signs you're being spoofed:
Immediate fix (Linux):
# 1. Find your gateway IP and its REAL MAC (check your router's label) ip route show default # 2. Flush the poisoned entry sudo ip neigh flush 192.168.1.1 # 3. Set a static ARP entry (replace with your router's real MAC) sudo arp -s 192.168.1.1 aa:bb:cc:dd:ee:ff # 4. Enable kernel-level ARP protection sudo sysctl -w net.ipv4.conf.all.arp_announce=2 sudo sysctl -w net.ipv4.conf.all.arp_ignore=1 sudo sysctl -w net.ipv4.conf.all.rp_filter=1
Permanent fix:
/etc/sysctl.conf so they persist across rebootssudo apt install arpwatch — monitors ARP changes 24/7Find the attacker:
nmap -sn 192.168.1.0/24 to find all devices and their MACssudo iptables -A INPUT -m mac --mac-source XX:XX:XX:XX:XX:XX -j DROPMap all WiFi networks in range. Groups access points by SSID, showing all BSSIDs, channels, signal strength, and security for each network. Useful for identifying multi-AP deployments and spotting rogues.
Trace an IP address: reverse DNS, GeoIP, whois, open ports, associated processes, connection history.