Skip to content

MITM Tool is a Python-based network security tool for performing ARP (Address Resolution Protocol) poisoning attacks, commonly known as Man-in-the-Middle (MITM) attacks. It intercepts network traffic between a target client and the network gateway. The tool is designed for educational purposes and authorized penetration testing only.

License

Notifications You must be signed in to change notification settings

s-r-e-e-r-a-j/MITMTOOL

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

65 Commits
 
 
 
 
 
 
 
 

Repository files navigation

MITM Tool - ARP Poisoning & Packet Sniffing

MITM Tool is a Python-based network security tool for performing ARP (Address Resolution Protocol) poisoning attacks, commonly known as Man-in-the-Middle (MITM) attacks. It intercepts network traffic between a target client and the network gateway. The tool is designed for educational purposes and authorized penetration testing only.

Features

  • ARP Scanning: Automatically discovers devices on the network and their IP/MAC addresses.
  • ARP Spoofing: Spoofs ARP packets to redirect traffic through the attacker's machine.
  • Packet Sniffing: Captures all intercepted packets and saves them as .pcap files for analysis.
  • Multithreading: Runs ARP spoofing and packet sniffing simultaneously.
  • User Interface: Displays a list of available devices and allows the user to select a target device for ARP poisoning.

Requirements:

  • Python 3.x
  • Scapy (Python library for packet manipulation)
  • Root (sudo) privileges to run the script
  • Linux-based OS (Tested on Kali Linux)

Installation

  1. Install Dependencies:

Ensure you have Python 3.x installed

pip3 install -r requirements.txt

2 . Clone the Repository:

Clone this repository to your local machine.

git clone https://github.com/s-r-e-e-r-a-j/MITMTOOL.git
cd MITMTOOL
cd 'MITM TOOL'

Usage

  1. Run the Tool:

To run the tool, use the following command with the desired IP range:

sudo python3 arp_mitm.py -ip_range 192.168.1.0/24

Replace 192.168.1.0/24 with the IP range of your target network.

  1. Menu Interaction:

Once the tool starts, it will display a list of devices found in the network and their IP/MAC addresses. You will then be prompted to select a target device for ARP poisoning.

Example output:

ID      IP                MAC Address
------------------------------------------
0       192.168.1.2       00:1a:2b:3c:4d:5e
1       192.168.1.3       00:1b:2c:3d:4e:5f
2       192.168.1.4       00:1c:2d:3e:4f:60

Choose the ID of the device whose ARP cache you want to poison.

  1. Capture Packets:

Once ARP poisoning is active, all intercepted packets will be saved in a requests.pcap file in 'MITM TOOL' Directory, which can be analyzed using Wireshark.

  1. Stop the Tool:

To stop the script, simply press Ctrl + C.

Important Notes

  • Legal Disclaimer: This tool is intended for educational purposes only. Do not use it on any network without explicit permission from the network owner. Unauthorized use of this tool is illegal and can result in severe consequences.
  • Root Privileges: The script requires root (sudo) privileges to interact with network interfaces and manipulate ARP tables.
  • Network Disruption: The tool can disrupt normal network traffic for both the target and the attacker’s machine. Use it responsibly in controlled environments.

Example Workflow

  1. Run the tool with the desired IP range:
sudo python3 arp_mitm.py -ip_range 192.168.1.0/24
  1. Select a device to target (ARP poisoning):
Please select the ID of the computer whose ARP cache you want to poison (ctrl+z to exit): 1
  1. The script will begin ARP poisoning, sending spoofed ARP packets, and sniffing network traffic.

  2. Intercepted packets are saved in requests.pcap on 'MITM TOOL' Directory and can be analyzed in Wireshark.

License

This project is licensed under the MIT License - see the LICENSE file for details.

Disclaimer:

Use this tool responsibly. Unauthorized usage is illegal and unethical. Always obtain permission before testing any network.

About

MITM Tool is a Python-based network security tool for performing ARP (Address Resolution Protocol) poisoning attacks, commonly known as Man-in-the-Middle (MITM) attacks. It intercepts network traffic between a target client and the network gateway. The tool is designed for educational purposes and authorized penetration testing only.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages