Sniffs traffic on an interface and triggers an action when packets match user-defined rules.
cp match.dist.py match.py
and configure your desired packet matching rulescp hijack.dist.py hijack.py
and configure your desired action./agent.py <listen interface> [action wait seconds]
Works well in combination with bridge-mitm-tools!
Listen on interface br0 and run after 5 seconds of silence:
./agent.py br0 5
This will:
- Monitor br0 for incoming and outgoing packets
- Attempt to detect a client packet using
match.py:match_client()
- On client detection, attempt to detect a server packet using
match.py:match_server()
- On client and server detection, wait 5 (default: 3) seconds
- Trigger
hijack.py:start_hijack()
- On interrupt (CTRL-C), trigger
hijack.py:stop_hijack()
See also: *.example.py
.