Offensive Network Security Framework

This git stream is considered a live and unstable build. All stable entries are committed into a release package.

  • Fully manages system states automatically for Airbase-ng with bridging and ipv4_forwarding ability.
  • Configures all necessary elements and performs MITM, ARP, WPA Cracking, Sniffing and SSLstrip attacks.

offers an advanced section

Configuration file modified by user. All Access Point options, devices, and attacking methods are set here. The user may modify options before launching new attacks without interrupting current attack, as long as the current attack window remains open.
You may not comment out option lines but you may disable options if you decide on storing multiple possible options for testing. This is done by e.g. #IFACE1=
Flexibility of ettercaps options have been preserved by allowing the user to change the options passed during execution.
Ettercap default switches are -Tqz the user could simply change that value to -Tq if they wanted to enable initial arp.

N4P uses it’s own DHCP configuration for its Access Point creation. We do this so that connected targets can not view our machine inside the local network.

View of Access Point Airbase-ng running along with the custom connected clients monitor window. As clients connect to our AP their ip address will display here. Other monitor options are available by changing the MONITOR_MODE= option in n4p.conf file from option 2

Download and read more about the project.


Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

How to Become an Expert in Ethical Hacking

This article is mainly addressing the audience who wants to pursue their career in Cybersecurity as a professional that provides ethical hacking services, whether...

5 Cybersecurity Tips to Keep in Mind When Working From Home

  Due to the ongoing global health crisis, more and more people are being forced to work from their homes. In fact, Forbes estimates that about...

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...