Skip to content

BlackVenom is an ethical ARP and DNS spoofing tool πŸ›‘οΈ designed for cybersecurity professionals, enabling the interception and logging of network traffic πŸ“„ to identify vulnerabilities. It facilitates effective network analysis πŸ” while ensuring stealth and compliance with ethical hacking practices βš–οΈ.

Notifications You must be signed in to change notification settings

sergio11/blackvenom

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

67 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ•·οΈ BlackVenom: The Ultimate Ethical ARP and DNS Spoofing Tool πŸ•ΈοΈ

BlackVenom is a powerful ARP and DNS spoofing tool designed for ethical hackers and cybersecurity professionals. πŸ›‘οΈ This utility allows you to seamlessly intercept and log network traffic, providing valuable insights into network vulnerabilities while remaining undetected. πŸ•΅οΈβ€β™‚οΈβš‘

Built with stealth and precision in mind, BlackVenom operates like a digital venomous strike: fast, effective, and silent. πŸ–€ Whether you're conducting penetration tests, monitoring network vulnerabilities, or analyzing traffic for security research, BlackVenom empowers you to take full control of ARP tables and spoof DNS requests for educational and professional purposes. πŸ–₯οΈπŸ’‰

πŸ™ I would like to express my sincere gratitude to Santiago HernΓ‘ndez, a leading expert in Cybersecurity and Artificial Intelligence. His outstanding course on Cybersecurity and Ethical Hacking, available on Udemy, was instrumental in the development of this project. The insights and techniques I gained from his course were invaluable in guiding my approach to cybersecurity practices. Thank you for sharing your knowledge and expertise!

Join the BlackVenom web of digital defenders and harness the power of stealthy network manipulation for the greater good! πŸ•ΈοΈβœ¨

Disclaimer ⚠️

BlackVenom is intended for ethical use only. Misuse of this tool against unauthorized systems is illegal and may result in severe penalties. Always obtain permission before testing network security. πŸ“œ

Key Features:

  • 🌐 ARP Spoofing Mastery: Perform bidirectional ARP spoofing to impersonate devices and intercept traffic between them. πŸ”„
  • πŸ” DNS Spoofing Capabilities: Redirect DNS requests to specified IP addresses, enabling control over domain resolutions. πŸ“‘
  • πŸ“„ Traffic Logging: Capture and log all intercepted network traffic in a configurable PCAP file for later analysis. πŸ“‚
  • βš™οΈ Ethical & Stealthy: Designed for ethical hacking, ensuring you stay invisible while uncovering security flaws. πŸ•ΆοΈ

Use Cases:

  • Network Penetration Testing: Assess the security of networks by identifying weaknesses in ARP protocols and DNS resolutions. πŸ”πŸ›‘οΈ
  • Security Auditing: Log and analyze network traffic to discover potential vulnerabilities and improve network defenses. πŸ“ŠπŸ”’
  • Educational Purposes: Learn and teach network security concepts through practical, hands-on experience with ARP and DNS spoofing techniques. πŸŽ“πŸ“š
  • Traffic Analysis: Monitor and capture traffic for forensic investigations or to understand user behavior on a network. πŸ”πŸ“ˆ

Understanding ARP Spoofing and DNS Spoofing πŸ”

  • ARP Spoofing: This technique involves sending false ARP (Address Resolution Protocol) messages over a local area network. By doing so, an attacker can associate their MAC address with the IP address of another device (e.g., the default gateway), allowing them to intercept and manipulate traffic intended for that device. This can lead to various attacks, including man-in-the-middle attacks and session hijacking. ⚠️

  • DNS Spoofing: This technique manipulates DNS (Domain Name System) responses to redirect traffic from legitimate websites to malicious ones. By altering the DNS records, an attacker can control what IP addresses users are directed to when they attempt to access specific domains. This can be used to carry out phishing attacks or serve malicious content. 🌐

IP Forwarding and IPTABLES πŸ“‘

For BlackVenom to successfully intercept and forward traffic between the target and gateway, IP forwarding must be enabled on the system. This allows the machine running BlackVenom to act as a bridge, forwarding packets between the target and the network.

To enable IP forwarding, use the following command:

echo 1 > /proc/sys/net/ipv4/ip_forward

Additionally, you may need to configure IPTABLES to allow forwarding of packets. Here’s a basic command to set up the necessary rules:

iptables -A FORWARD -i eth0 -j ACCEPT
iptables -A FORWARD -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT

These commands ensure that the traffic can flow through the machine while BlackVenom performs its operations. πŸ›‘οΈ

Key Techniques in BlackVenom Development πŸ› οΈ

  • NetFilterQueue: This library allows the interception of packets within the Linux kernel's Netfilter framework. It provides a powerful way to capture and manipulate network packets, making it an essential tool for implementing ARP and DNS spoofing techniques. πŸ₯…

  • Scapy: A powerful Python library used for packet manipulation, Scapy allows for the creation, sending, and receiving of network packets. It's crucial for constructing ARP and DNS packets needed for spoofing. πŸ“¦

  • Threading: To ensure that the tool operates efficiently without blocking the main execution thread, threading is utilized to manage concurrent packet processing for both ARP and DNS spoofing operations. 🧡

  • Traffic Logging: Using libraries like pcap and tqdm, BlackVenom captures and logs network traffic in real-time, providing a comprehensive analysis of intercepted packets for further examination. πŸ“Š

Dependencies πŸ“¦

BlackVenom requires several Python packages to function effectively. Below are the key dependencies along with their respective versions:

  • scapy==2.6.0 🐍: A powerful Python library for network packet manipulation, allowing the creation, sending, and sniffing of network packets.
  • tqdm==4.65.0 ⏳: A fast, extensible progress bar for Python, used to provide visual feedback during long-running tasks.
  • rich==13.9.2 🌈: A library for rich text and beautiful formatting in the terminal, enhancing the output of the tool with colors and styles.
  • netifaces==0.11.0 🌐: A cross-platform library to get network interface information, useful for identifying available interfaces for ARP spoofing.
  • NetfilterQueue==1.1.0 πŸ”„: A Python binding to the netfilter queue library, allowing the manipulation of packets in user space for packet filtering and modification.

Ensure that these dependencies are installed in your Python environment to use BlackVenom effectively. βœ