
Getty Images
Identifying the devices on your network is a critical security task. After all, you can't secure what you don't know. While plenty of fancy configuration management tools list the nodes on a network, sometimes the simple and straightforward utilities are best.
Arp-scan is a tool that discovers and identifies IPv4 network nodes by using Address Resolution Protocol (ARP) queries to generate a comprehensive list of devices. Its use of ARP sets arp-scan well apart from scanners that rely on ping (ICMP), TCP or User Datagram Protocol (UDP) scans. Many tools operate atOSI Layer 3, such asNmap. Not all network devices respond to such higher-level scans. Because ARP is a fundamental component of networking, an arp-scan query at OSI Layer 2 will almost certainly succeed.
Arp-scan has a specific limitation. Because ARP is not routable, an arp-scan is limited to the local subnet. This is often exactly what you want: a focused, direct and easily controlled scan. For a broader network scan, consider Nmap,Angry IP Scanner or a similar tool.
Let's look at how to install arp-scan, basic scan options and then evaluate use cases.
Installing arp-scan on your Linux penetration testing box is as simple as calling up your distribution's preferred package manager.
For Ubuntu, Debian and similar distributions, type:
apt install arp-scan
On Fedora, Alpine Linux, Rocky or Red Hat Enterprise Linux distros, type:
dnf install arp-scan
On openSUSE, type:
zypper install arp-scan
On Arch Linux, type :
pacman -S arp-scan
Many security-oriented distributions, such asKali Linux, include arp-scan by default.
Mac users shouldinstall the Homebrew Mac package manager and then type the following command to install arp-scan:
brew install arp-scan
The installation is more challenging for Windows users. You'll need an arp-scan port (check GitHub), the Cygwin Unix-like environment or Windows Subsystem for Linux. After installing arp-scan, run it from the Terminal. It's a command-line application.
Arp-scan works by sending ARP requests to all IP addresses in a specified range. These requests ask the receiving computers to respond to the source device with their IP address. This is an integral part of basic IP networking, so all systems should respond. Arp-scan records each response and displays the results.
The basic arp-scan syntax relies on a user to identify a network interface and the subnet you want to scan.
arp-scan -I <interface-id> <subnet>
For example, to scan subnet 192.168.2.0/24 on interface eth1, type:
arp-scan -I eth1 192.168.2.0/24
The results include all devices that respond to the ARP query. Arp-scan identifies them by media access control (MAC) and IP address, along with the network interface card manufacturer. The scan should finish quickly, since there's not much to the protocol.
Wireless networks also rely on MAC addresses, so you can specify your system's wireless interface as the source. This is a handy option for finding rogue wireless devices on your network.
Various arp-scan options can modify the tool's behavior. Combine the following with the standard scan options for greater flexibility:
Review thearp-scan man page for additional options. Combine the various options to gather and format the information needed.
Thearp-fingerprint command is part of the arp-scan package. Use it to target a single host.
Increase the arp-scan output verbosity by using the-v option. The results display scan passes in progress, packet length details, debug information and more. Use multiple v options for greater detail (such as -vvv).
Keep in mind that arp-scan does not attempt to hide from intrusion detection systems or other scan prevention tools. Its queries are obvious and noisy. If you prefer a stealthy scan, consider other tools. Netdiscover, for example, might be a good alternative. ARP traffic, however, is a normal part of networking, so other communications could camouflage your scan.
Use arp-scan in any scenario where detecting network nodes is crucial but hiding your actions is not. Consider the following examples:
Other network scanners, such as Nmap, work one layer higher in the OSI model than arp-scan. This provides greater functionality, but it also limits some of their usefulness. Since arp-scan operates at OSI Layer 2, it scans only the local segment. It will, however, find nodes other scanners might miss. Combine arp-scan and Nmap scans for best results. An arp-scan's simplicity is its greatest asset.
Damon Garn owns Cogspinner Coaction and provides freelance IT writing and editing services. He has written multiple CompTIA study guides, including the Linux+, Cloud Essentials+ and Server+ guides, and contributes extensively to Informa TechTarget, The New Stack and CompTIA blogs.
The interim standard brings a boatload of major improvements to 5G on the way to 6G's planned release in 2030. Learn what they do...
Utilities increasingly choose private over public 5G for its superior control, flexibility and security, enabling applications ...
Palo Alto Networks acquired observability platform Chronosphere for $3.35 billion. The deal aims to enable AI-driven autonomous ...
Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a ...
These certifications and courses can help you gain the specialized knowledge you need to bolster your credentials and ...
Enterprises are embracing short-form video for speed and engagement, but its rise brings new complexities. CIOs must establish ...
Firmware, such as BIOS or UEFI, plays a crucial role in how securely a Windows device starts and operates. Organizations need to ...
The battle for desktop agent mindshare heats up. Microsoft is the latest to arm everyday office workers with tools to make their ...
Learn how to set up multifactor authentication in Microsoft 365 to enhance security, prevent unauthorized access and protect ...
Transform manually created AWS resources into manageable, automated infrastructure with CloudFormation's import resource with ...
In today's rapidly changing tech landscape, cloud strategy is more important than ever. This guide explores how to best use your ...
Cloud dominance intensifies as AWS, Microsoft and Google capture 63% of the $107B market. AWS leads at 29%, despite erosion, ...
Acclaim Autism is a US organisation that has increased employee task discretion, with an increase in insurance approvals by using...
The latest Post Office prosecution to be sent to the Court of Appeal involves a third IT system in a 2001 case, after previous ...
Industry and healthcare leaders are concerned that NHS tech funding is too focused on already approved platforms, fails to tackle...


