Man in the Middle in C with netcat TCP packets

This page summarizes the projects mentioned and recommended in the original post on /r/Pentesting

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
  • seed-labs

    SEED Labs developed in the last 20 years.

  • I'm implementing an ARP spoofing and man in the middle attack tool in C. For that I took the docker container config from Seed Labs. Here three containers are present: Host A (ip: 10.9.0.5, mac: 02:42:0a:09:00:05), Host B (ip: 10.9.0.6, mac: 02:42:0a:09:00:06), and Host M (ip: 10.9.0.105, mac: 02:42:0a:09:00:69). Host M is to be the attacker.

  • arp_poisoning

    Arp Poisoning tool in C using raw sockets

  • I programmed the ARP spoofing tool from this repository](https://github.com/SRJanel/arp_poisoning) and it works. If I open a netcat port at Host B and connect from Host A, then send something from Host A after running the spoofing tool, the message doesn't get through to Host B. I took a packet sniffer from here to check if the netcat packets are indeed being sent to Host M instead of Host B. And it shows the ARP spoofing is working. I checked with Wireshark, too.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts