creak – Poison, Reset, Spoof, Redirect MITM Script

Performs some of the most famous MITM attack on target addresses located in a local network. Among these, deny navigation and download capabilities of a target host in the local network performing an ARP poison attack and sending reset TCP packets to every request made to the router. Born as a didactic project for learning python language, I decline every responsibility for any abuse, including malevolent or illegal use of this code.



Installation 

or simply clone the repository and run the creak.py after all requirements are installed:

It is required to have installed pcap libraries for raw packet manipulations and dpkt module, for dns spoofing options is required to have installed dnet module from libdnet package, do not confuse it with pydnet (network evaluation tool) module. It can use also scapy if desired, can just be set in the config.py file.

Options

Example
Most basic usage: Deny all traffic to the target host

Set a different gateway:

Set a different mac address for the device:

Spoof mac address generating a fake one:

Spoof mac address generating one based on manufacturer(e.g Xeros):

DNS spoofing using a fake MAC address, redirecting ab.xy to cd.xz(e.g. localhost):

Deny multiple hosts in the subnet:

                Download


 

Comments

Popular posts from this blog

How To Hack WIFI WPS pin With Kali Linux

World’s Fastest Camera Takes 5 Trillion Photos Per Second, Can Pause Moving Light