 Features & Components

ARPoLan combines several powerful components to deliver its impressive capabilities:

  • • Network Scanning: Discover devices on the local network by sending ARP requests and collecting responses.
  • • ARP Spoofing: Perform ARP spoofing attacks to intercept and manipulate network traffic.
  • • HID Functionality: Utilize the Atmega32u4's USB HID capabilities for additional attack vectors.
  • • Real-time Monitoring: Visual and serial indicators for attack detection and network activity.

藺 Getting Started

I designed the PCB for ARPoLan using Altium Designer, creating a simple yet efficient two-layer layout. Here’s a breakdown of the components used:

  • Atmega32u4 Microcontroller: Handles USB communication and processing tasks.
  • W5500 Ethernet Module: Provides reliable network connectivity with an integrated hardware TCP/IP stack.
  • 25 MHz Crystal Oscillator: Ensures precise timing for network operations.
  • RJ45 Ethernet Socket: Facilitates network connections with integrated status LEDs.
  • LM1117 Voltage Regulator: Supplies a stable 3.3V power to the W5500.
  • USB A Port: Allows for easy programming and data transfer.
  • Passive Components: Capacitors and resistors for power stabilization and signal integrity.

The communication between the W5500 and the Atmega32u4 is handled via the SPI protocol, ensuring quick and reliable data transfer.

 Schematic

The PCB for ARPoLan was designed using Altium Designer, featuring a two-layer layout optimized for compactness and efficiency. The board integrates all necessary components, ensuring reliable connections between the Atmega32u4 and the W5500.

  • Connection Table

  • Ensure the VCC pin of the W5500 is connected to a 3.3V power supply, as the module operates at 3.3V logic levels.
  • The SS (Slave Select) pin can be connected to any digital pin on the Arduino Pro Micro, but it must be defined correctly in the code.
  • Make sure the GND of the Arduino Pro Micro is connected to the GND of the W5500 module to ensure a common ground.

This setup will enable SPI communication between the Arduino Pro Micro and the W5500 Ethernet module.

 Usage

First Code: Local Rubber Ducky The first piece of code transforms ARPoLan into a local Rubber Ducky. The Atmega32u4's USB HID capabilities allow it to act like a keyboard or mouse, injecting pre-programmed keystrokes into a connected computer. This was a fun experiment, though I refer to it as the "bad idea" code due to its potential risks.

Second Code: ARP Spoofing Next, I tested the ARP spoofing code. This script injects malicious ARP packets into the network, leveraging the processing power of the Atmega32u4 and the network capabilities of the W5500. While not overly powerful, it demonstrated the device's potential for network security tasks.

Third Code: Network Scanning The final code was for network scanning. By sending ARP requests to all IP addresses within a specified range, ARPoLan could identify active devices on the network. This functionality is crucial for network monitoring and penetration testing.

Code & PCB

If you're interested in building this project, the code and schematic are available on GitHub. Simply visit the GitHub repository to download the necessary files. If the project gains attention, I’ll open-source the PCB files as well. Feel free to test the code and share your feedback or improvements.

GitHub repository: github.com/cifertech/arpolan

 Special Thanks to Our Sponsor: JLCPCB

No project is complete without the right tools and materials. That’s where our sponsor, JLCPCB, stepped in to provide essential support for this project. JLCPCBis a leading provider of high-quality printed circuit boards (PCBs) and PCB assembly services.

Simply head over to jlcpcb.com, upload your PCB design files, select your preferences, and Your custom PCBs are on their way to you in no time.

if you sign up using the link...

Read more »