GithubHelp home page GithubHelp logo

ramixix / mitm_sniffer Goto Github PK

View Code? Open in Web Editor NEW
3.0 1.0 0.0 3 KB

A simple Man In The Middle program that will capture specified amount of traffic form the target machine and wirte it to specified file

Python 100.00%

mitm_sniffer's Introduction

mitm_sniffer

A man-in-the-middle attack is a type of eavesdropping attack, where attackers interrupt an existing conversation or data transfer. After inserting themselves in the "middle" of the transfer, the attackers pretend to be both legitimate participants.

In simple terms A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Attackers might use MitM attacks to steal login credentials or personal information, spy on the victim, or sabotage communications or corrupt data.

How man-in-the-middle attacks work

There are more than one technique that attackers can use to become a man-in-the-middle, I have used ARP Cache Poisoning here and it here how it works :
Address Resolution Protocol (ARP) is a low-level process that translates the machine address (MAC) to the IP address on the local network. Attackers inject false information into this system to trick your computer to think the attacker’s computer is the network gateway. When you connect to the network, the attacker is receiving all of your network traffic (instead of your real network gateway) and passes the traffic along to its real destination. From your perspective, everything is normal. The attacker is able to see all of your packets.

What we do in this piece of code? [steps]
1. Attacker Finds the Mac address of gateway and Target host

2. Attacker sends a packet to your computer with the faked source address of the gateway and the correct ARP sequence to fool your computer into thinking the attacker’s computer is the gateway

3. At the same time, Attacker fool gateway into thinking the attacker’s computer is the host by sending fake arp packets.

4. After fooling both gateway and target host attacker sniffs the specified packet number and write them to a pcap file.

mitm_sniffer's People

Contributors

ramixix avatar

Stargazers

Adem Çapan avatar Roman avatar Yingyi Chen avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.