Skip to content
This repository has been archived by the owner on Jun 7, 2020. It is now read-only.

Latest commit

 

History

History
39 lines (23 loc) · 1.49 KB

README.md

File metadata and controls

39 lines (23 loc) · 1.49 KB

2IC80-Project

What is this?

This is a tool used to automatically ARP poison hosts on the local network, as well as DNS spoof them at the same time.

It has options for selecting interfaces, whitelisting certain hosts, DNS spoofing specific domains, or all. The idea is to improve the semi-automatic approach of Ettercap. This tool can redirect local traffic visiting www.example.com to any IP address specified by the attacker. Furthermore, the attacker can perform a Man-in-the-Middle (MitM) attack on any of the intercepted packages.

You can find a short demo of the tool here:

2IC80-Project Demo

Prerequisites

The tool has been developed for a Linux environment.

In order to use the tool python 3.7 or higher must be installed:

Any other version might work as well, but has not been tested.

PIP must also be installed.

The following packages are required to run code:

  • scapy
  • IPy

You can run the following command in the 2IC80-Project folder to install all required packages:

python -m pip install -r requirements.txt

Running the tool

In the 2IC80-Project folder run the following command: python main.py

Any options that can be specified will be prompted during the execution.