Skip to content

Latest commit

 

History

History

packet_sniffer

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

Packet sniffer

Can be used to sniff packets on an interface of the hacking machine.

Requirements

  • Root access
  • Python 3
  • Scapy

Usage

usage: packet_sniffer.py [-h] [-i INTERFACE]

Packet sniffer

optional arguments:
  -h, --help            show this help message and exit
  -i INTERFACE, --interface INTERFACE
                        interface to use

Example: 
            packet_sniffer.py -i eth0
            packet_sniffer.py          # with default eth0

Kicking the tyres

Become MitM by running the arp_spoofer

@kali:~$ sudo python3 arp_spoofer.py
[sudo] password for <user>: 
[+] Setting forward
[+] Packets sent: 118

Start the sniffer:

@kali:~$ sudo python3 packet_sniffer.py
[sudo] password for <user>: 

Go to sites (for example http://testphp.vulnweb.com/login.php) in browser. If you wish to see results for https sites, fire up the Bettercap hstshijack caplet.

View results in terminal where sniffer runs:

@kali:~$ sudo python3 packet_sniffer.py
[sudo] password for <user>: 
[+] HTTP Request >> testphp.vulnweb.com/userinfo.php

[+] Possible username/password >> b'uname=test&pass=test'

Troubleshooting