This is a tool used to automatically ARP poison hosts on the local network, as well as DNS spoof them at the same time.
It has options for selecting interfaces, whitelisting certain hosts, DNS spoofing specific domains, or all.
The idea is to improve the semi-automatic approach of Ettercap. This tool can redirect local traffic visiting www.example.com
to any IP address specified by the attacker. Furthermore, the attacker can perform a Man-in-the-Middle (MitM) attack on any of the intercepted packages.
You can find a short demo of the tool here:
The tool has been developed for a Linux environment.
In order to use the tool python 3.7 or higher must be installed:
Any other version might work as well, but has not been tested.
PIP must also be installed.
The following packages are required to run code:
- scapy
- IPy
You can run the following command in the 2IC80-Project folder to install all required packages:
python -m pip install -r requirements.txt
In the 2IC80-Project folder run the following command: python main.py
Any options that can be specified will be prompted during the execution.