Code Monkey home page Code Monkey logo

sharp's Introduction

                 ||                               _______       _______          
                 ||                  /\          |        ?    |        ?     
                 ||                 /  \         |         ?   |         ?    
                 ||                /    \        |         ?   |         ?    
           //    ||-------        /      \       |________?    |________?     
          //     ||      ||      /--------\      |     \       |              
         //_____ ||      ||     /          \     |      \      |              
              // ||      ||    /            \    |       \     |             
             //  ||      ||   /              \   |        \    |             
            //   ||      ||  /                \  |         \   |             

Description-

ARP spoofing allows an attacker to intercept data frames on a network, modify the traffic, or stop all traffic. Often the attack is used as an opening for other attacks, such as denial of service, man in the middle, or session hijacking attacks. This anti- ARP spoofing program, (shARP) detects the presence of a third party in a private network actively. It has 2 mode: defensive and offensive.

Previous Releases - shARP_1.0

Prerequisites -

-Linux distro
-Python 2.7.x
-Aircrack-ng
-espeak (optional)
-Network card that supports monitor mode and packet injection

You can check if your linux wireless driver supports these functionalities from this page

What's new ?

shARP_2.0 can perform active scan as well as passive scans in both defensive and offensive modes.

Defensive mode - Defensive mode protects the end user from the spoofer by disconnecting the user's system from the network. This mode also alerts the user by an audio message as soon as spoofing is detected.

Offensive mode - Offensive mode disconnects the user's system from the network and further kicks out the attacker by sending De-authentication packets to his system, this doesn't let him reconnect to the network until the program is manually reset.

Active Scan - Use when your system is left idle most of the time. Active scan is most efficient method to protect you system and the network from ARP-spoofing incidents.

Passive Scan - Use when your system is busy transferring data through the network. Passive scan is efficient in for constant data transfering devices as your device and the network would be secured from ARP-spoofing incidents without compromising the speed or the network bandwidth.

Help

bash ./shARP.sh -h

screenshot from 2017-05-14 21-24-35

Defensive mode with active scanning

bash ./shARP.sh -d -a wlan0

screenshot from 2017-05-14 21-25-30

Defensive mode with Passive scanning

bash ./shARP.sh -d -p wlan0

screenshot from 2017-05-14 21-26-24

Offensive mode with Active scan

bash ./shARP.sh -o -a wlan0

screenshot from 2017-05-14 21-27-53

screenshot from 2017-05-14 21-28-47

Offensive mode with Passive scan

bash ./shARP.sh -o -p wlan0

screenshot from 2017-05-14 21-29-45

screenshot from 2017-05-14 21-29-54

Reset Network Card

bash ./shARP.sh -r wlan0

Reset your network card only when used with active mode or when the network adaptor doesn't work properly. Else you can switch back on your network connection manually.

screenshot from 2017-05-14 21-25-53

Records-

The program creates a log file in the folder /usr/shARP/ containing the details of the attack such as the attackers mac address, mac vendor, time and date of the attack.

One can identify the NIC of the attacker's system with the help of the obtained mac address. The whole program is designed specially for linux and is written in bash and python. In the offensive mode the program downloads an open-source application from with the permission of the user namely aircrack-ng (if not present in the user's system already). Visit https://www.aircrack-ng.org for more info.

Edits-

If you wish to get an audio alert please download espeak or comment out those lines in the source code.

Note-

  1. I won't suggest using this software over wired connections, especially in offensive mode as it might cause network instability.
  2. Use the offensive mode only with the NICs that supports monitor mode.
  3. Offensive mode does DOS attack on the ARP-spoofer. Use Offensive mode only after making sure that you have appropriate right(s) over the network and the device(s) connected to it and make sure that doing so is legal in your Country/State.
  4. Offensive mode will not work if your wifi card/driver doesn't support packet injection.

sharp's People

Contributors

europa502 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

sharp's Issues

Python 2 is EOL

If this tool wants to have some future, it has to be ported to Python 3.
Thanks, anyway

CTRL+C trap

maybe you could add a function which executes when the user presses CTRL+C.
so that thing return to normal once you exit the script

trap ctrl_c INT
ctrl_c () {
#some code here
}

ping: unknown host gateway

$ ./shARP.sh -d ens33
ping: unknown host gateway
gateway not found

$ arp
Address HWtype HWaddress Flags Mask Iface
192.168.1.1 ether 2c:95:7f:0a:6e:30 C ens33

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.