IMR allows you to perform an ARP attack on two systems by using FreeBSD's Berkeley Packet Filter.

The program is meant for educational purposes only. Please distribute the sources and spread the word if you consider IMR useful.

IMR has been documented using POD, Perl's "Plain Old Documentation" format. See README for more details or just run pod2text imr.cpp.

download (C++ code for FreeBSD)

UPDATE-21-07-05: IMR now uses the libpcap file format to store logged data. Thus, you are able to load and study logs with Wireshark, tcpdump or any other program that supports libpcap files.

UPDATE-06-09-08: BPF_WORDALIGN is used correctly now. See my blog post for more details.