sagarkha has asked for the
wisdom of the Perl Monks concerning the following question:
I have developed a ARP spoofing script in Perl. This script actually corrupts ARP entry of all PC's in a LAN(only one subnet like 172.28.16.0/24), also it can corrupt router/L3 device ARP table. I have used it in my Office and the entire department was down, people were thinking that either switch or the firewall has gone down, but the actual reason was that i corrupted their PC's ARP entry through that script.
I dont think it is something unique i have developed and i m sure people must have used in the past, but still I want monks to check it. Now the problem is that if I post my code here, any hacker can use it for wrong purpose and my intensions are not to harm anybody. I have got a lot of experience in Network Admin/Security Admin role but i am new to Perl and Ethical Hacking.