问题描述
我正试图在船上生成一个反向ARP,想知道我在Wireshark中看到的这个MAC是什么
>>> arppkt
<Ether dst=ff:ff:ff:ff:ff:ff src=00:0c:29:68:0f:e8 type=0x806 |<ARP hwsrc=00:0c:29:68:0f:e8 psrc=0.0.0.0 hwdst=00:0c:29:68:0f:e8 pdst=0.0.0.0 |>>
>>> sendp(arppkt)
.
Sent 1 packets.
剪断电线。
Frame 103: 60 bytes on wire (480 bits),60 bytes captured (480 bits) on interface \Device\NPF_{976930CF-D062-49F4-A7F4-740A995E4F69},id 0
Ethernet II,Src: LiteonTe_af:e0:4b (74:e5:43:af:e0:4b),Dst: broadcast (ff:ff:ff:ff:ff:ff)
Address Resolution Protocol (request/gratuitous ARP)
Hardware type: Ethernet (1)
Protocol type: IPv4 (0x0800)
Hardware size: 6
Protocol size: 4
Opcode: request (1)
[Is gratuitous: True]
Sender MAC address: LiteonTe_af:e0:4b (74:e5:43:af:e0:4b) >>>>
Sender IP address: 0.0.0.0
Target MAC address: VMware_68:0f:e8 (00:0c:29:68:0f:e8)
Target IP address: 0.0.0.0
根据构建的数据包,源应为00:0c:29:68:0f:e8
解决方法
暂无找到可以解决该程序问题的有效方法,小编努力寻找整理中!
如果你已经找到好的解决方法,欢迎将解决方案带上本链接一起发送给小编。
小编邮箱:dio#foxmail.com (将#修改为@)