Author Topic: LANs.py  (Read 37254 times)

Hackdroid

  • Newbie
  • *
  • Posts: 13
    • View Profile
on: June 27, 2014, 02:25:41 PM
LANs.py

Automatically find the most active WLAN users then spy on one of them and/or inject arbitrary HTML/JS into pages they visit. Technically: multithreaded asynchronous packet parsing/injecting ARP/DNS poisoner.

Individually poisons the ARP tables of the target box, the router and the DNS server if necessary. Does not poison anyone else on the network. Displays all most the interesting bits of their traffic and can inject custom html into pages they visit. Cleans up after itself.

Here is the link: https://github.com/DanMcInerney/LANs.py


P.S.
I can't make it work here in backbox. However, it works well with kali linux. I hope you can make it work. Thanks.
« Last Edit: June 27, 2014, 05:57:20 PM by Hackdroid »



b4d_bl0ck

  • Sr. Member
  • ****
  • Posts: 285
    • View Profile
Reply #1 on: June 27, 2014, 09:38:50 PM
Thanks Hackdroid,
we already have tools with similar functionalities, so i don't know if it's going to be included in BackBox, but it can be discussed.
Anyways i see it's a one-file script, so i think anyone who wants to use it will not have issues grabbing and executing it.
If i have time i'll test it to see why it's not working. Maybe others will post their feedbacks too...

Bye.

bool secure = check_paranoia() ? true : false;


Hackdroid

  • Newbie
  • *
  • Posts: 13
    • View Profile
Reply #2 on: June 28, 2014, 07:46:43 AM
Hello b4d_bl0ck. Thanks for the reply. I have some arguments though. LANs.py is better than other alternatives because it offers simplicity as well as full automation compared to others. In addition to that, it has support for beef-xss which in some cases beneficial to somebody. I hope you can test it soon and have a look at it's features. Thanks.