A simple tool for performing Man-In-The-Middle(MITM) attack on Internet Key Exchange version 2 protocal(IKEv2) based on python library scapy
.
- python >= 3.6
- scapy
- argparse
-
Show explicit usage information by run
python mitm.py -h
in terminal. -
-i
designate network interface to attack with(eg:en0
is default port in Mac) -
-t1
designate first target to spoof -
-t2
designate second target to spoof which is actualt1
's communication target -
-f
enable IP forwarding(Linux only) -
-q
disable feedback messages -
-c
traces attack duration
python mitm.py -i en0 -t1 192.168.1.8 -t2 192.168.1.1 -f -q -c
I monitor network activities through Wireshark, which gives me the result as screenshot pictured below:
The result shows that we have become MITM between 196.168.1.2
and 192.168.1.1
, which grants us the access to their communication information. Furthurmore, we may be able to decrypt the information we captured and change or delete what we want in it.
If you are looking for more about MITM, Bettercap is an easy to use, all-in-one solution with all the features you might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.