Network.py is a Python-based network security tool designed to perform packet sniffing and Address Resolution Protocol (ARP) spoofing. It enables users to monitor network traffic and manipulate ARP tables to intercept communications between devices on a local network.
- Packet Sniffing: Capture and analyze network packets in real-time.
- ARP Spoofing: Impersonate devices on the network to intercept and monitor communications.
- Combined Operations: Execute both sniffing and ARP spoofing concurrently for comprehensive network analysis.
Ensure you have the following installed:
- Python 3.x
- Required Python packages (listed in
requirements.txt)
-
Clone the repository:
git clone https://github.com/Abr-ahamis/PRODIGY_CS_05.git
-
Navigate to the project directory:
cd PRODIGY_CS_05 -
Setup required packages:
Create a virtual environment (env).
Activate it.
Install scapy and netifaces.
python3 setup_requirements.pysudo python3 network.py ssTo execute both sniffing and ARP spoofing simultaneously for a specific IP address, use the following command:
sudo python3 network.py ss -i <target_ip>Replace <target_ip> with the IP address of the target device. For example:
sudo python3 network.py ss -i 192.168.0.5To analyze the captured packets and filter traffic for a specific IP address, use:
sudo python3 network.py -a <packet_log> -i <target_ip>Replace <packet_log> with the path to your packet log file and <target_ip> with the IP address you wish to filter. For example:
sudo python3 network.py -a packet_log.txt -i 192.168.0.5ss: Initiates both sniffing and ARP spoofing.-i, --ip: Specifies the target IP address.-a, --analyze: Analyzes the specified packet log file.
Contributions are welcome! Please fork the repository and submit a pull request with your enhancements.
This project is licensed under the MIT License. See the LICENSE file for details.
Warning: This tool is intended for educational and authorized testing purposes only.