Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mauricelambert/passwordssniffer
This module sniff username and password of unprotected protocols.
https://github.com/mauricelambert/passwordssniffer
man-in-the-middle mim password-attack pypi-package python3 scapy sniffer
Last synced: 3 months ago
JSON representation
This module sniff username and password of unprotected protocols.
- Host: GitHub
- URL: https://github.com/mauricelambert/passwordssniffer
- Owner: mauricelambert
- License: gpl-3.0
- Created: 2021-08-08T21:36:23.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-08-10T06:56:53.000Z (over 3 years ago)
- Last Synced: 2024-01-05T20:22:03.136Z (about 1 year ago)
- Topics: man-in-the-middle, mim, password-attack, pypi-package, python3, scapy, sniffer
- Language: Python
- Homepage:
- Size: 128 KB
- Stars: 6
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE.txt
Awesome Lists containing this project
README
# PasswordsSniffer
## Description
This module sniff username and password of unprotected protocols.## Requirements
This package require:
- python3
- python3 Standard Library
- Scapy## Installation
```bash
pip install PasswordsSniffer
```## Usages
### Command line
```bash
PasswordsSniffer
python3 -m PasswordsSniffer
python3 PasswordsSniffer.pyzPasswordsSniffer test # test all available class
PasswordsSniffer -i "localhost" # change iface
PasswordsSniffer --iface "localhost" # change iface
PasswordsSniffer -P 2323 # Add analysis on server response on port 2323
PasswordsSniffer --add-response-ports 2323 # Add analysis on server response on port 2323
PasswordsSniffer -p 8080 # Add analysis on client request on port 8080
PasswordsSniffer --add-request-ports 8080 # Add analysis on client request on port 8080
PasswordsSniffer --add-string "Password: " # Detect a packet if "Password: " is in TCP Raw content
PasswordsSniffer -s "Password: " # Detect a packet if "Password: " is in TCP Raw content
PasswordsSniffer -l 20 # Change log level
PasswordsSniffer --log-level 20 # Change log level
```### Python script
```python
from PasswordsSniffer import *
sniffer = SnifferAll()
sniffer.start()
``````python
import PasswordsSniffer
from scapy.all import TCPclass CustomSniffer(PasswordsSniffer.SnifferTelnet):
def __init__(self):
super().__init__()self.ports = [2323]
self.protocol = TCP
self.strings = [b'Password: ']
self.regexs = [r'\w:\s?$'.encode()]
self.request_detection_ports = self.ports
self.response_detection_ports = self.portssniffer = CustomSniffer()
sniffer.start()
```## Links
- [Pypi](https://pypi.org/project/PasswordsSniffer)
- [Github](https://github.com/mauricelambert/PasswordsSniffer)
- [Documentation](https://mauricelambert.github.io/info/python/security/PasswordsSniffer.html)
- [Python executable](https://mauricelambert.github.io/info/python/security/PasswordsSniffer.pyz)## License
Licensed under the [GPL, version 3](https://www.gnu.org/licenses/).