nemesis
netsniff-ng
nemesis | netsniff-ng | |
---|---|---|
1 | 2 | |
480 | 1,177 | |
0.8% | 2.3% | |
2.4 | 0.0 | |
7 months ago | over 1 year ago | |
C | C | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
nemesis
-
ARP-Poisoned Devices Don't Route Packets
I was toying around with nemesis and I figured out it didn't correctly forward packets to my laptop. On wireshark, only the ARP packets from the poisoning are visible, with not a single packet of the victim being received despite the victim reporting the ARP-poisoning worked. I'm not worried about the victim having internet access, as I want to drop all the packets I receive. This is not the reported behavior, as the victim has complete internet access despite me not messing with packet forwarding in linux. The specific command I'm using is as follows:
netsniff-ng
-
What is the correct way to do a git pull, ./configure, make, make install within a dockerfile?
RUN apt-get update && \ apt-get install -y iproute2 iputils-ping iperf3 tcpdump netcat ethtool \ mtr iftop nmap python3 python3-pip joe nano ccache flex bison libnl-3-dev \ libnl-genl-3-dev libnl-route-3-dev libgeoip-dev libnetfilter-conntrack-dev \ libncurses5-dev liburcu-dev libnacl-dev libpcap-dev zlib1g-dev libcli-dev \ libnet1-dev git RUN pip3 install ncclient requests scapy iperf3 RUN mkdir -p python_scripts/ \ mkdir -p packet_samples/ RUN git clone https://github.com/netsniff-ng/netsniff-ng.git COPY packet_samples/ packet_samples/ ADD python_scripts/iperf3_docker_client.py python_scripts/iperf3_docker_client.py ADD python_scripts/iperf3_docker_server.py python_scripts/iperf3_docker_server.py ADD python_scripts/ping_test.py python_scripts/ping_test.py RUN /netsniff-ng/configure WORKDIR /netsniff-ng RUN /netsniff-ng/configure && \ make && \ make install && WORKDIR / ENTRYPOINT ["/bin/bash"]
-
Awesome Penetration Testing
netsniff-ng - Swiss army knife for network sniffing.
What are some alternatives?
masscan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
mitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
etl2pcapng - Utility that converts an .etl file containing a Windows network packet capture into .pcapng format.
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
pwntools - CTF framework and exploit development library
Divert - WinDivert: Windows Packet Divert
iodine - Official git repo for iodine dns tunnel
scapy - Scapy: the Python-based interactive packet manipulation program & library.
tcpreplay - Pcap editing and replay tools for *NIX and Windows - Users please download source from
dnstwist - Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Metasploit - Metasploit Framework