7 C
London
Friday, December 15, 2023

Highly effective Community Packet Sniffing Device Designed To Seize And Analyze Community Site visitors




PacketSpy is a strong community packet sniffing software designed to seize and analyze community visitors. It offers a complete set of options for inspecting HTTP requests and responses, viewing uncooked payload information, and gathering info about community gadgets. With PacketSpy, you may acquire useful insights into your community’s communication patterns and troubleshoot community points successfully.

Options

  • Packet Seize: Seize and analyze community packets in real-time.
  • HTTP Inspection: Examine HTTP requests and responses for detailed evaluation.
  • Uncooked Payload Viewing: View uncooked payload information for deeper investigation.
  • System Info: Collect details about community gadgets, together with IP addresses and MAC addresses.

Set up

git clone https://github.com/HalilDeniz/PacketSpy.git

Necessities

PacketSpy requires the next dependencies to be put in:

pip set up -r necessities.txt

Getting Began

To get began with PacketSpy, use the next command-line choices:

root@denizhalil:/PacketSpy# python3 packetspy.py --help                          
utilization: packetspy.py [-h] [-t TARGET_IP] [-g GATEWAY_IP] [-i INTERFACE] [-tf TARGET_FIND] [--ip-forward] [-m METHOD]

choices:
-h, --help present this assist message and exit
-t TARGET_IP, --target TARGET_IP
Goal IP tackle
-g GATEWAY_IP, --gateway GATEWAY_IP
Gateway IP tackle
-i INTERFACE, --interface INTERFACE
Interface identify
-tf TARGET_FIND, --targetfind TARGET_FIND
Goal IP vary to seek out
--ip-forward, -if Allow packet forwarding
-m METHOD, --method METHOD
Restrict sniffing to a selected HTTP technique

Examples

  1. System Detection
root@denizhalil:/PacketSpy# python3 packetspy.py -tf 10.0.2.0/24 -i eth0

System discovery
**************************************
Ip Tackle Mac Tackle
**************************************
10.0.2.1 52:54:00:12:35:00
10.0.2.2 52:54:00:12:35:00
10.0.2.3 08:00:27:78:66:95
10.0.2.11 08:00:27:65:96:cd
10.0.2.12 08:00:27:2f:64:fe

  1. Man-in-the-Center Sniffing
root@denizhalil:/PacketSpy# python3 packetspy.py -t 10.0.2.11 -g 10.0.2.1 -i eth0
******************* began sniff *******************

HTTP Request:
Technique: b'POST'
Host: b'testphp.vulnweb.com'
Path: b'/userinfo.php'
Supply IP: 10.0.2.20
Supply MAC: 08:00:27:04:e8:82
Protocol: HTTP
Person-Agent: b'Mozilla/5.0 (X11; Linux x86_64; rv:105.0) Gecko/20100101 Firefox/105.0'

Uncooked Payload:
b'uname=admin&cross=mysecretpassword'

HTTP Response:
Standing Code: b'302'
Content material Sort: b'textual content/html; charset=UTF-8'
--------------------------------------------------

FootNote

Https work nonetheless in progress

Contributing

Contributions are welcome! To contribute to PacketSpy, observe these steps:

  1. Fork the repository.
  2. Create a brand new department on your function or bug repair.
  3. Make your modifications and commit them.
  4. Push your modifications to your forked repository.
  5. Open a pull request in the principle repository.

Contact

You probably have any questions, feedback, or recommendations about PacketSpy, please be happy to contact me:

License

PacketSpy is launched underneath the MIT License. See LICENSE for extra info.



Latest news
Related news

LEAVE A REPLY

Please enter your comment!
Please enter your name here