Koen1999 / 2IC80-Project

Submission for the 2IC80 group project. It consists of a tool that can poison ARP caches and spoof DNS responses.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

2IC80-Project

What is this?

This is a tool used to automatically ARP poison hosts on the local network, as well as DNS spoof them at the same time.

It has options for selecting interfaces, whitelisting certain hosts, DNS spoofing specific domains, or all. The idea is to improve the semi-automatic approach of Ettercap. This tool can redirect local traffic visiting www.example.com to any IP address specified by the attacker. Furthermore, the attacker can perform a Man-in-the-Middle (MitM) attack on any of the intercepted packages.

You can find a short demo of the tool here:

2IC80-Project Demo

Prerequisites

The tool has been developed for a Linux environment.

In order to use the tool python 3.7 or higher must be installed:

Any other version might work as well, but has not been tested.

PIP must also be installed.

The following packages are required to run code:

  • scapy
  • IPy

You can run the following command in the 2IC80-Project folder to install all required packages:

python -m pip install -r requirements.txt

Running the tool

In the 2IC80-Project folder run the following command: python main.py

Any options that can be specified will be prompted during the execution.

About

Submission for the 2IC80 group project. It consists of a tool that can poison ARP caches and spoof DNS responses.


Languages

Language:Python 100.0%