Individually poisons the ARP tables of
the target box, the router and the DNS server if necessary. Does not
poison anyone else on the network. Displays all most the interesting
bits of their traffic and can inject custom html into pages they
visit. Cleans up after itself.
developed to poison the ARP tables of the target computer. The tool
has previously been tested on Kali Linux, the example has also
mentioned below.
Table of Contents
Requirement:
-
Linux (Kali recommended)
-
Scapy
-
Python nfqueue-bindings 0.4.3
-
Aircrack-ng
-
Python twisted
-
BeEF (optional)
not to worry about most of the prereqs except python-nfqueue.
type:
apt-get install -y python-nfqueue
it to whatever.py Now open the terminal and locate the directory
where u have saved the script before.
LANs.py ARP Poisoning Tutorial
Simplest usage (including active user targeting):
PRE.cjk { font-family: “Droid Sans”,monospace; }PRE.ctl { font-family: “FreeSans”,monospace; }P { margin-bottom: 0.08in; }CODE.cjk { font-family: “Droid Sans”,monospace; }CODE.ctl { font-family: “FreeSans”,monospace; }A:link { }
python LANs.py
Because there’s no -ip option this will ARP scan the network, compare
it to a live running promiscuous capture, and list all the clients on
the network including their Windows netbios names along with how many
data packets they’re sending. so you can immediately target the
active ones. The ability to capture data packets they send is very
dependent on physical proximity and the power of your network card.
then you can Ctrl-C and pick your target which it will then ARP
spoof. Simple target identification and ARP spoofing.
Passive harvesting:
PRE.cjk { font-family: “Droid Sans”,monospace; }PRE.ctl { font-family: “FreeSans”,monospace; }P { margin-bottom: 0.08in; }CODE.cjk { font-family: “Droid Sans”,monospace; }CODE.ctl { font-family: “FreeSans”,monospace; }A:link { }
python LANs.py -u -d -p -ip 192.168.0.10
-u: prints URLs visited; truncates at 150 characters and filters
image/css/js/woff/svg urls since they spam the output and are
uninteresting
-d: open an xterm with driftnet to see all images they view
-p: print username/passwords for FTP/IMAP/POP/IRC/HTTP, HTTP POSTs
made, all searches made, incoming/outgoing emails, and IRC messages
sent/received; will also decode base64 if the email authentication is
encrypted with it
-ip: target this IP address
Easy to remember and will probably be the most common usage of the
script: options u, d, p, like udp/tcp.
Further more, share your thought regarding the tool and the usage.