Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India
Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan
Performs some of the most famous MITM attack on target addresses located in a local network. Among these, deny navigation and download capabilities of a target host in the local network performing an ARP poison attack and sending reset TCP packets to every request made to the router. Born as a didactic project for learning python language, I decline every responsibility for any abuse, including malevolent or illegal use of this code.
Installation
1
2
3
|
$ git clone https://github.com/codepr/creak.git
$ cd creak
$ python setup.py install
|
or simply clone the repository and run the creak.py
after all requirements are installed:
1
|
$ git clone https://github.com/codepr/creak.git
|
It is required to have installed pcap
libraries for raw packet manipulations and dpkt
module, for dns spoofing options is required to have installed dnet module from libdnet
package, do not confuse it with pydnet (network evaluation tool) module. It can use also scapy
if desired, can just be set in the config.py
file.
Options
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
|
Usage: creak.py [options] dev
Options:
–h, —help show this help message and exit
–1, —sessions–scan Sessions scan mode
–2, —dns–spoof Dns spoofing
–3, —session–hijack Try to steal a TCP sessions by desynchronization (old technique)
–x, —spoof Spoof mode, generate a fake MAC address to be used
during attack
–m MACADDR Mac address octet prefix (could be an entire MAC
address in the form AA:BB:CC:DD:EE:FF)
–M MANUFACTURER Manufacturer of the wireless device, for retrieving a
manufactur based prefix for MAC spoof
–s SOURCE Source ip address (e.g. a class C address like
192.168.1.150) usually the router address
–t TARGET Target ip address (e.g. a class C address like
192.168.1.150), can be specified multiple times
–p PORT Target port to shutdown
–a HOST Target host that will be redirect while navigating on
target machine
–r REDIR Target redirection that will be fetched instead of host
on the target machine
–v, —verbose Verbose output mode
–d, —dotted Dotted output mode
|
Example
Most basic usage: Deny all traffic to the target host
1
|
$ python creak.py –t 192.168.1.30 wlan0
|
Set a different gateway:
1
|
$ python creak.py –s 192.168.1.2 –t 192.168.1.30 wlan0
|
Set a different mac address for the device:
1
|
$ python creak.py –m 00:11:22:33:44:55 –t 192.168.1.30 wlan0
|
Spoof mac address generating a fake one:
1
|
$ python creak.py –x –t 192.168.1.30 wlan0
|
Spoof mac address generating one based on manufacturer(e.g Xeros):
1
|
$ python creak.py –x –M xeros –t 192.168.1.30 wlan0
|
DNS spoofing using a fake MAC address, redirecting ab.xy to cd.xz(e.g. localhost):
1
|
$ python creak.py –x –M xeros –t 192.168.1.30 –a www.ab.xy –r www.cd.xz wlan0
|
Deny multiple hosts in the subnet:
1
|
$ python creak.py –x –t 192.168.1.30 –t 192.168.1.31 –t 192.168.1.32 wlan0
|
Download
www.extremehacking.org
Sadik Shaikh | Cyber Suraksha Abhiyan, Ethical Hacking Training Institute, CEHv9,CHFI,ECSAv9,CAST,ENSA, CCNA, CCNA SECURITY,MCITP,RHCE,CHECKPOINT, ASA FIREWALL,VMWARE,CLOUD,ANDROID,IPHONE,NETWORKING HARDWARE,TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking,Center For Advanced Security Training in India, ceh v9 course in Pune-India, ceh certification in pune-India, ceh v9 training in Pune-India, Ethical Hacking Course in Pune-India