<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ron Vincent Cada</title>
    <description>The latest articles on DEV Community by Ron Vincent Cada (@lucifron28).</description>
    <link>https://dev.to/lucifron28</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1996252%2F66f1c08f-9e9d-4867-bbb6-021b9190371a.jpeg</url>
      <title>DEV Community: Ron Vincent Cada</title>
      <link>https://dev.to/lucifron28</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/lucifron28"/>
    <language>en</language>
    <item>
      <title>WharpDOS – I Built an ARP-Based DoS Tool in Python to Learn Network Attacks (Ethically)</title>
      <dc:creator>Ron Vincent Cada</dc:creator>
      <pubDate>Fri, 20 Jun 2025 12:57:08 +0000</pubDate>
      <link>https://dev.to/lucifron28/wharpdos-i-built-an-arp-based-dos-tool-in-python-to-learn-network-attacks-ethically-in2</link>
      <guid>https://dev.to/lucifron28/wharpdos-i-built-an-arp-based-dos-tool-in-python-to-learn-network-attacks-ethically-in2</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7xcxo6f7j2luafhpfgbg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7xcxo6f7j2luafhpfgbg.png" alt=" " width="800" height="450"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As a student specializing in Web and Mobile Application Development, I’ve always been curious about how systems behave beyond the frontend and backend layers — especially when it comes to network security.&lt;/p&gt;

&lt;p&gt;So, I gave myself a challenge:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Build a working denial-of-service (DoS) tool that manipulates the network layer — not through floods or DDoS — but by exploiting trust in local communication.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;The result? WharpDOS — a Python-based ARP spoofing &amp;amp; network disconnection tool, designed for ethical testing and educational purposes.&lt;/p&gt;

&lt;p&gt;What is ARP Spoofing?&lt;/p&gt;

&lt;p&gt;ARP (Address Resolution Protocol) is what devices use to map IP addresses to MAC addresses in local networks.&lt;br&gt;
It’s fast, but it’s also vulnerable — any device can send a forged ARP reply, poisoning the ARP cache of others.&lt;/p&gt;

&lt;p&gt;This is what ARP spoofing does:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Tells the victim, “Hey, I’m the router.”

Tells the router, “Hey, I’m the victim.”

Then intercepts or disrupts traffic.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;In WharpDOS, I went a step further:&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;Instead of forwarding traffic like a man-in-the-middle tool, I drop it — creating a simple, silent, non-congestive denial of service.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;⚙️ Features&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;✅ ARP Network Scanning (via scapy)
✅ Interactive Whitelisting (prompt trusted IPs)
✅ ARP Spoofing Engine (without packet forwarding)
✅ Real-Time Monitoring (detect new devices as they connect)
✅ Threaded CLI UI using rich and prompt_toolkit
✅ ARP Table Restoration on Exit (clean shutdown)

Developed and tested on Arch Linux.
Requires sudo/root access to send raw packets.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;Code: &lt;a href="https://github.com/lucifron28/wharpdos" rel="noopener noreferrer"&gt;https://github.com/lucifron28/wharpdos&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Feel free to clone, test, and modify it — in a safe, legal environment.&lt;/p&gt;

&lt;p&gt;Disclaimer&lt;br&gt;
WharpDOS is intended strictly for:&lt;br&gt;
    Educational cybersecurity practice&lt;br&gt;
    ethical hacking simulations&lt;br&gt;
    Controlled lab environments&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;❌ Do not use this tool on networks you do not own or have permission to test.
❌ Unauthorized deployment can result in disciplinary or legal consequences.
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

&lt;p&gt;What I Learned&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;How ARP works under the hood, and how fragile it can&lt;/li&gt;
&lt;li&gt;How to design a CLI tool that interacts live with the network&lt;/li&gt;
&lt;li&gt;The importance of graceful exits in tools that manipulate protocol state&lt;/li&gt;
&lt;li&gt;How ethical hacking tools can be powerful learning projects
What’s Next?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I’d love to:&lt;br&gt;
    Explore packet forwarding (to simulate MitM instead of DoS)&lt;br&gt;
    Add logging and interface selection menus&lt;br&gt;
    Try converting the logic to a GUI Qt version for more visualization&lt;/p&gt;

&lt;p&gt;About Me&lt;/p&gt;

&lt;p&gt;Hi! I’m Ron Vincent Cada, an IT student focused on fullstack development and slowly diving into cybersecurity.&lt;br&gt;
I love building practical tools that help me (and hopefully others) learn how systems really work.&lt;/p&gt;

&lt;p&gt;Let’s connect here or on GitHub:&lt;br&gt;
🔗 &lt;a href="https://github.com/lucifron28" rel="noopener noreferrer"&gt;https://github.com/lucifron28&lt;/a&gt;&lt;/p&gt;

</description>
      <category>python</category>
      <category>linux</category>
      <category>cybersecurity</category>
      <category>networking</category>
    </item>
  </channel>
</rss>
