Showing posts from March, 2021

WRITING A PACKET_SNIFFER

PACKET_SNIFFER CODE: BASE#1 #!/usr/bin/env python import scapy.all as scapy def sniff (interface): scapy.sniff( iface =interface , store = False, prc =process_sniffed_packet) def process_sniffed_packet (packet): print (packet) sniff( "…

PROGRAMMING A NETWORK SCANNER/ARP PROTOCOL

# Network scanner there Discover all devices on the network Display there IP addresss Display there MAC address THE VIRTUAL MACHINE[VM] REQUIRE AN EXTERNAL ADAPTER TO SEARCH IP/MAC ADDRESS THE INBUILT WIFI ADAPTER WOULD NOT WORK!! #CODES ifconfig th…

WRITING A CODE INJECTOR

gzip IS use to compress HTML Encodings Therefore when the browser sends the response it will first compress the response to a gzip format send it to us! #IP-table  FOR-REMOTE-PC -RUN:  iptables -I  OUTPUT  -j NFQUEUE --queue-num 0 -RUN:  iptables -…

WRITING A FILE INTERCEPTOR/REPLACE

# MODEFYING DATA IN HTTP-LAYER MOTIVE: EDIT REQUEST/RESPONSES REPLACE DOWNLOAD REQUEST INJECT CODE(HTML/JS) The Port number used for HTTP is 80 #IP-table  FOR-REMOTE-PC -RUN:  iptables -I  OUTPUT  -j NFQUEUE --queue-num 0 -RUN:  iptables -I INPUT -j…

ARP_SPOOF + PACKET_SNIFFR

NOTE: WE TOOK AN EXAMPLE OF ETH0/IN VM CODE: ARP_SPOOFING_FILE_DRIVE #!/usr/bin/env python import scapy.all as scapy import time import sys def get_mac ( ip ): arp_request = scapy.ARP( pdst = ip ) broadcast = scapy.Ether( dst = "ff:ff:f…

Load More
That is All