With python3 and pip:
Linux :
install the deps
$ pip install -r requirements.txt
launch the server with su permissions (required)
$ sudo python serv.py
Using a python3 virtual environment (venv) :
Create a venv and activate it
$ python -m venv venv
$ . venv/bin/activate
Install the deps
$ pip install -r requirements.txt
Launch the server with su permissions (required)
$ sudo python serv.py
use '-s' or '--server' parameter to lauch the program in server mode and communicate with websocket, otherwise the program wil be launched in standalone mode
The server use json through websockets to communicate with the client :
["command", "arg1", "arg2", [...]]
You can find an instance of a python client in testClient.py
-
Return IP of every connected device using nmap
- (optional) network adress with cidr notation
default to "192.168.0.0/24"
example : ["192.168.0.11", "192.168.0.21", "192.168.0.23"]
- (optional) network adress with cidr notation
-
Return IP & Mac of every connected client, faster than a nmap scan but less reliable
- (optional) network adress with cidr notation
default to "192.168.0.0/24"
example : [{"ip": "192.168.0.33", "mac": "70:85:c2:83:00:70"}, {"ip": "192.168.0.41", "mac": "68:a3:78:50:67:8a"}, {"ip": "192.168.0.22", "mac": "20:47:da:28:8c:51"}]
- (optional) network adress with cidr notation
-
launch an arp spoofing attaque
- target's ip (required)
- gateway's ip (optional)
default to "192.168.0.254"
-
sniff the packet of the target and send them to the gateway
- target's ip (required)
- gateway's ip (optional)
default to "192.168.0.254"
-
change the default gateway's value
- gateway's ip (required)
example "192.168.0.254"
- gateway's ip (required)
-
stop the spoofing of a specific adress
- target's ip (required)
-
stop the sniffing of a specific adress
- target's ip (required)
-
return the ip of the devices getting spoofed
-
return the ip of the devices getting sniffed