Skip to content

SilverFoxx/Spoofa

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

46 Commits
 
 
 
 
 
 

Repository files navigation

Spoofa

An alternative to Arpspoof, with added functionality. It is used to poison the ARP-cache of targeted hosts on a LAN, allowing a Man-in-the-Middle attack.

Install Requirements

gem install pcaprub
gem install packetfu

How it works

Can be launched either from the command line (with options), or as an interactive script.

If the whole network is targeted, Spoofa sends ARP requests, and then adds those hosts that reply to the target list. This is more effective than simply sending spoofed packets to the broadcast address, as some hosts will ignore these.

Spoofed ARP packets are sent every 4 seconds to all live hosts, directing their traffic through the attacking machine. If two-way spoofing is selected, ARP packets are also sent to the gateway, allowing sniffing of traffic moving from gateway to target.

Once spoofing is underway, Spoofa monitors the network for ARP packets from newly arrived hosts. If they are in the original target range, they will also be spoofed.

Before closing, Spoofa will re-ARP the network with all targets' original MAC addresses.

Usage

Interactive mode

Start without any arguments: ruby spoofa

This runs a quick script to set the variables, and will offer sane defaults for the various options.

Command line mode

ruby spoofa [-hpv] [-t target(s)] [-g gateway] -i interface

Required:

-i interface

Options:

-h Help

-p Uses parallel/multi-threaded scanning. Very slow without it; but possibly unstable on some systems. Best run with "-v".

-v Run verbosely

-t targets(s) One or more targets separated by comma (no whitespace), and/or hyphened range(s). E.g. "-t 192.168.1.10,192.168.1.50-100". If omitted, the entire subnet will be targeted. Without [-g], one-way spoofing is performed, i.e. packets from the target are intercepted."

-g gateway A second target, usually the gateway. Performs two-way spoofing, i.e. intercepts packets both to and from the target.

Examples

ruby spoofa -t 10.0.0.2-50 -i eth0 One-way spoofing of 10.0.0.2 to 10.0.0.50.

ruby spoofa -t 10.0.0.5,10.0.0.10-20 -g 10.0.0.254 -i wlan1 Two-way spoofing of 10.0.0.5 and 10-20, and the gateway (10.0.0.254).

ruby spoofa -vp -i wlan3 One-way spoofing of all live hosts, verbosely, with multi-threading.

ruby spoofa Starts in interactive mode, and prompts for variables.

Troubleshooting

Tested on Kali Linux only.

Check gems are installed: gem list

If errors installing gems, first try: apt-get install ruby-dev libpcap0.8-dev

Run packetfu's tests:

cd /var/lib/gems/1.9.1/gems/packetfu-1.1.8/test/ && ruby all_tests.rb

Play with packetfu's excellent irb (check is executable first):

cd /var/lib/gems/1.9.1/gems/packetfu-1.1.8/examples && irb -r ./packetfu-shell.rb

Ensure you are connected to the network before running the script.

Multi-threading is used to speed up the scanning (live host detection). The settings are conservative (runs on 2011 MBA, VMWare Fusion, 800MB RAM assigned). If the scanning hangs, try without "-p".

Best to use a USB wireless card if running in a VM, due to the unpredictable way the VM handles address assignment and forwarding.

You will probably see frequent socket errors from PacketFu if the network connection is poor.

Forum: Spoofa thread in kali linux forum

Author

VulpiArgenti (SilverFoxx) (C) 2013

Licence

GPL. See LICENSE for licensing details.

About

A Ruby alternative to Arpspoof, with added functionality

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages