Skip to content
This repository has been archived by the owner on Jun 7, 2020. It is now read-only.
/ 2IC80-Project Public archive

Submission for the 2IC80 group project. It consists of a tool that can poison ARP caches and spoof DNS responses.

Notifications You must be signed in to change notification settings

Koen1999/2IC80-Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

28 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

2IC80-Project

What is this?

This is a tool used to automatically ARP poison hosts on the local network, as well as DNS spoof them at the same time.

It has options for selecting interfaces, whitelisting certain hosts, DNS spoofing specific domains, or all. The idea is to improve the semi-automatic approach of Ettercap. This tool can redirect local traffic visiting www.example.com to any IP address specified by the attacker. Furthermore, the attacker can perform a Man-in-the-Middle (MitM) attack on any of the intercepted packages.

You can find a short demo of the tool here:

2IC80-Project Demo

Prerequisites

The tool has been developed for a Linux environment.

In order to use the tool python 3.7 or higher must be installed:

Any other version might work as well, but has not been tested.

PIP must also be installed.

The following packages are required to run code:

  • scapy
  • IPy

You can run the following command in the 2IC80-Project folder to install all required packages:

python -m pip install -r requirements.txt

Running the tool

In the 2IC80-Project folder run the following command: python main.py

Any options that can be specified will be prompted during the execution.

About

Submission for the 2IC80 group project. It consists of a tool that can poison ARP caches and spoof DNS responses.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages