Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/gh0stkn1ght/mitm-droid

A tool to perform man-in-the-middle attacks with arp-spoofing on rooted Android devices
https://github.com/gh0stkn1ght/mitm-droid

android android-hacking android-hacking-tools arp-attack arp-spoofing linux man-in-the-middle man-in-the-middle-attack mitm mitm-attack python python-hacking python-hacking-tools rooted-android scapy termux termux-hacking termux-hacking-tool termux-hacking-tools termux-root

Last synced: 11 days ago
JSON representation

A tool to perform man-in-the-middle attacks with arp-spoofing on rooted Android devices

Awesome Lists containing this project

README

        

# MITM-Droid
A tool to perform man-in-the-middle attacks with ARP-spoofing on rooted Android devices
# Why?
There are a lot of different tools for MITM attacks and ARP-spoofing, but all of those require you to enable net.ipv4.ip_forward setting in your kernel. Why is it bad? It is not a big problem, when you use Kali Linux, for example. But in Android systems it is a way more complicated process(even on rooted devices). After many attempts, I gave up on trying to enable IP forwarding in system kernel and decided to recreate needed functionality with Scapy. So, if you want to perform this sort of attacks with your Android phone, this program is the easiest way to do it.
# Supported platforms
Linux - ✔️ (tested on Kali)

Android[Termux] - ✔️ (rooted)

Windows - ❓ (wasn't tested, but should work)

MacOS - ❓ (wasn't tested)
# Usage
### For all platforms: replace in the code with MAC of your attacker device.


## Linux | Android[Termux]
### Warning: you need to be root
```
pip install scapy
curl https://raw.githubusercontent.com/gh0stKn1ght/MITM-Droid/main/mitm.py --output mitm.py
sudo python mitm.py
```
## Other
I didn't test it on Windows and MacOS, so I can't provide step-by-step instructions here. But all you need is to install Python and Scapy and run the script with admin/root permissions.

### When you've completed all previous steps, simply follow instructions in the script and the attack will start. All intercepted packets will be saved into .pcap file with the name entered by you.