项目作者: Subangkar

项目描述 :
Sending icmp ping with a spoofed IP using unix raw socket
高级语言: Python
项目地址: git://github.com/Subangkar/ICMP-Ping-Spoofing.git
创建时间: 2019-09-15T17:44:12Z
项目社区:https://github.com/Subangkar/ICMP-Ping-Spoofing

开源协议:

下载


ICMP Ping Spoofing Attack

Victim’s source IP is spoofed to send a ping to server from Attacker.
As the source IP is spoofed server takes is as a original IP and hence ping reply is sent to victim instead of attacker who send the actual ping request.
Also a sniffer using pcap is built to sniff ICMP packets for verification.

Environments:

  • Any Linux Based OS
  • libpcap-dev for linux
  • Qt4 support for GUI
  • Python 2.7+ for GUI

Running the program:

  • To run from terminal,
    First run the sniffer with
    ./sniff.sh <net-interface-name>
    Then run the spoofing program,
    ./spoof.sh <source-ip> <destination-ip> <payload>
    Example:

    1. ./sniff.sh wlp2s0
    2. ./spoof.sh "1.2.3.4" "8.8.8.8" "spoofed ping"
  • To run spoofing using GUI:
    python frontend.py

  • To run using mininet
    A virtual topology with 4 hosts is created with mininet using topology-mininet.py.
    run python topology-mininet.py to create the mininet.
    Must use python 2 and use frontend-mininet.py instead of frontend.py as mininet runs as root.