This is a basic attack tool which includes various attacks such as sniffing, spoofing and ICMP flooding. The application is written in C# using the WPF framework and Python with connection between them using Pythonnet.
To use this application, you must have the following prerequisites installed on your system:
Python 3.10
WINPCAP
Scapy module (pip install scapy)
Pythonnet module (pip install pythonnet and in NuGet packages)
.NET 6.0
Clone the repository and open the solution in Visual Studio. Make sure to set the startup project to "Lan Attacks Tool".
Upon launching the application, you will be presented with a user-friendly interface.
The "Sniffing" tab allows you to sniff packets on a given interface. Select the interface you wish to sniff and click "Start". The packets will be displayed in the data grid below.
The "Spoofing" tab allows you to spoof packets on a given interface. Select the interface you wish to spoof and enter the source and destination IP addresses and MAC addresses. Choose the type of packet you wish to send and click "Spoof". The packets will be sent to the target.
The "ICMP Flooding" tab allows you to flood a target with ICMP packets. Enter the target IP address and click "Start". The packets will be sent to the target.
If you find any bugs or issues, please submit an issue or pull request.
This project is licensed under the MIT License. See the LICENSE file for details.
Clone the project
git clone https://github.com/KrystianRozwag/pcf-proj
Install dependencies
Python 3.10
[WINPCAP](https://www.winpcap.org/)
Scapy module (pip install scapy)
Pythonnet module (pip install pythonnet and in NuGet packages)
.NET 6.0
In order to work with the application. In path ..\LanAttacks\bin\Debug\net6.0-windows change inside of the file python3_path.txt to the correct Python 3.10 dll's filepath. Without this step, user will not be able to run the project.
Run the application