Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/gregwar/mitm
Man in the middle tool
https://github.com/gregwar/mitm
arp-poisoning attack audit c network replayed-packets security security-tools
Last synced: 22 days ago
JSON representation
Man in the middle tool
- Host: GitHub
- URL: https://github.com/gregwar/mitm
- Owner: Gregwar
- License: mit
- Created: 2010-08-17T11:48:56.000Z (over 14 years ago)
- Default Branch: master
- Last Pushed: 2015-10-20T09:19:53.000Z (about 9 years ago)
- Last Synced: 2024-08-05T09:16:08.479Z (4 months ago)
- Topics: arp-poisoning, attack, audit, c, network, replayed-packets, security, security-tools
- Language: C
- Homepage:
- Size: 188 KB
- Stars: 30
- Watchers: 7
- Forks: 14
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-network-stuff - **26**星
README
# Mtm - Man in the middle tool
## Presentation
This tool can be use to perform a man in the middle using ARP
poisoning on two given hosts.Using osdep, a tunnel creation library which is part of the
aircrack project, it can set up an interface (`mitm0`) in which
the replayed packets will be written (to sniff easily).This tool is useful for network debugging and monitoring, and
was NOT designed for malicious usage.## Building & using
You'll need the lib pcap:
```
apt-get install libcap0.8-dev
```To build it, symply run:
```
make
```The usage is:
```
MitM v0.23 by GregWar
Usage: mitm -i interface [-t] ip1 ip2
-i interface: specify network interface to use
ip1: The IP adress of the first victim
ip2: The IP adress of the second victim
-t: Create a TAP interface containing the
replayed packets (in order to sniff)
```For example:
```
mitm -i wlan0 -t 192.168.1.1 192.168.1.10
```Will ARP poison `192.168.1.1` and `192.168.1.10`. All the replayed
packets will be available in the pseudo-interface `mitm0`.## License
This is under the MIT license