Skip to content

ANG13T/netspionage

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

95 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation



Network Analysis CLI framework that performs Network Scanning, OSINT, and Attack Detection

Installation    |    Usage    |    Contributing    |    Upcoming

Installation

# clone the repo
git clone https://github.com/ANG13T/netspionage.git

# change the working directory to netspionage
cd netspionage

# install the requirements
pip3 install -r requirements.txt

Update Config [configuration.ini]

Adjust configuration settings such as WiFi Interface, Color, and Text File Logging

[Settings]
LogToTextFile=False
WiFiInterface=wlan0
Color=green

Usage

In order to get started with netspionage just type:

python3 netspionage.py

OR

sudo -E python3 netspionage.py

Further Configuration

# Ensure your Network Adapter is on Monitor Mode 
sudo airmon-ng start wlan0

ip a

# Find name of Network Adapter (ie. wlan0mon)

# Set Interface to Name

vim configuration.ini

WiFiInterface=wlan0mon

Banner

                __             _                            
    ____  ___  / /__________  (_)___  ____  ____ _____ ____ 
   / __ \/ _ \/ __/ ___/ __ \/ / __ \/ __ \/ __ `/ __ `/ _ \
  / / / /  __/ /_(__  ) /_/ / / /_/ / / / / /_/ / /_/ /  __/
 /_/ /_/\___/\__/____/ .___/_/\____/_/ /_/\__,_/\__, /\___/ 
                    /_/                        /____/  
                    
 Created by Angelina Tsuboi [angelinatsuboi.net] V.0.0.1

 https://github.com/ANG13T/netspionage
 ----------------------------------------------------------------------------
 
 ENTER 1 - 4 TO SELECT OPTIONS

 1.  SCANNING                   Scan for IPs, nearby APs, ports, hosts, and more

 2.  RECONNAISSANCE             Gather  information  about nearby MAC addresses

 3.  DETECTION                  Detect for ARP Spoofing and SYN Flood attacks

 4.  EXIT                       Exit from netspionage to your terminal
 

NETWORK SCANNER

Gather information abuot devices connected to network such as IP address, MAC address, and OS.

netspionage >> 1
SCAN INPUT >> 1
NET IP ADDRESS (Eg: 192.168.1.1/24) >> 192.168.1.1/24

WiFi SCANNER

Gather information about nearby WiFi access points such as dBm Signal, SSID, channel, and encryption.

netspionage >> 1
SCAN INPUT >> 2

PORT SCANNER

Scan ports on a specified network to check if they are open or closed.

netspionage >> 1
SCAN INPUT >> 3
NET IP ADDRESS (Eg: 192.168.1.1/24) >> 192.168.1.1/24

MAC ADDRESS RECON (CHOOSE)

This option allows you to gather data about a selected device on the network via MAC address.

netspionage >> 2
RECON INPUT >> 1
NET IP ADDRESS (Eg: 192.168.1.1/24) >> 192.168.1.1/24

MAC ADDRESS RECON (INPUT)

This option allows you to gather data about a device via an inputted MAC address.

netspionage >> 2
RECON INPUT >> 2
MAC ADDRESS (Eg:08:00:69:02:01:FC) >> 08:00:69:02:01:FC

DETECT ARP SPOOFING

Detect for ARP Spoofing Attacks on your network.

netspionage >> 3
DETECT INPUT >> 1
NET IP ADDRESS (Eg: 192.168.1.1/24) >> 192.168.1.1/24

DETECT TCP FLOODING

Detect for TCP Flood Attacks on your network.

netspionage >> 3
DETECT INPUT >> 2
NET IP ADDRESS (Eg: 192.168.1.1/24) >> 192.168.1.1/24
TCP NUMBER (Eg: 80) >> 80

HELP

View all command options for netspionage.

netspionage >> help

EXIT

Exit netspionage from current terminal.

netspionage >> 4
Till next time!

Contributing

We would love to have you help us with the development of netspionage. Read below on how to get started!

Upcoming

Here is a list of features we would like to integrate to netspionage in the upcoming versions:

  • View/Edit config file (configuration.ini) through cli
  • Detect for more OS in scanner (scanner.py -> get_os())

Releases

No releases published

Packages

No packages published

Languages