Scripts that implement different network attacks
Project description
Hack Me
A collection of scripts that implement different network attacks. For information purposes only.
Any contributor to this project doesn't take any responsibility for illegal usage of any script from this project.
Installation and Usage
The tested environment:
- Python v3.10
- Ubuntu 22.04 LTS
Make sure that python3-scapy
is installed on your system: sudo apt-get install python3-scapy
You can either run hackmeapp from a checkout of the code, or install it like any other python project. Keep in mind that a lot of scripts here can be executed only with the root privileges, so you need to run it with sudo.
$ sudo pip3 install hackme
$ sudo hackme
usage: hackmeapp.py [-h] [--debug] {attack} ...
To enter the debug mode, use the --debug
option after the hackme
command.
To get the attack description in the terminal, enter hackme <attack> --desc
Implemented Attacks
The following commands include the --debug
option, which is not required to execute an attack.
ARP Spoofing
You can read about ARP spoofing attack here.
Example usage:
$ sudo hackme --debug arpspoof -i wlp2s0 -m aa:aa:aa:aa:aa:aa -gm BB-BB-BB-BB-BB-BB -gip 192.168.0.1 -vm cc:cc:cc:cc:cc:cc -vip 192.168.0.108
where:
wlp2s0
— your network interfaceaa:aa:aa:aa:aa:aa
— the interface MAC-address (can be written asAA:AA:AA:AA:AA:AA
,AA-AA-AA-AA-AA-AA
andaa-aa-aa-aa-aa-aa
)bb:bb:bb:bb:bb:bb
— the gateway's MAC-address192.168.0.1
— the gateway's IP-addresscc:cc:cc:cc:cc:cc
— the victim's MAC-address192.168.0.108
— the victim's IP-address
Run sudo hackme arpspoof --help
to get more information.
SYN Flood
You can read about SYN flood attack here.
Example usage:
$ sudo hackme --debug synflood -d 172.17.17.10 -p 443 -c 1000
where:
172.17.17.10
— server's IP-address443
— server's port1000
— the number of packets to be sent
Run sudo hackme synflood --help
to get more information.
UDP Flood
You can read about UDP flood attack here.
Example usage:
$ sudo hackme --debug udpflood -d 172.17.17.10 -p 53 -c 1000
where:
172.17.17.10
— server's IP-address53
— server's port1000
— the number of packets to be sent
Run sudo hackme udpflood --help
to get more information.
MAC Flood
You can read about MAC flood attack here.
Example usage:
$ sudo hackme --debug macflood -i lxdbr0 -vm "aa:aa:aa:aa:aa:aa" -c 100000
where:
lxdbr0
— your network interfaceaa:aa:aa:aa:aa:aa
— the victim's MAC-address (can be written asAA:AA:AA:AA:AA:AA
,AA-AA-AA-AA-AA-AA
andaa-aa-aa-aa-aa-aa
)100000
— the number of packets to be sent
Run sudo hackme macflood --help
to get more information.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file hackme-0.4.0.tar.gz
.
File metadata
- Download URL: hackme-0.4.0.tar.gz
- Upload date:
- Size: 22.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.10.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 19f79c5c180a7bdc3174f748db0862acf94f26254a1a1584878c38a2fe1549d7 |
|
MD5 | 1887f4394676e87aed170d0a670bd800 |
|
BLAKE2b-256 | 6047f329852c1a9397e0c430e4a5400f92687379d29308bf3b9eee7f31618d74 |
File details
Details for the file hackme-0.4.0-py3-none-any.whl
.
File metadata
- Download URL: hackme-0.4.0-py3-none-any.whl
- Upload date:
- Size: 26.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/4.0.1 CPython/3.10.4
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 0fb9cb2262e17dc0ef69830c8d95f382e86fcbdddeee0857d67cf7cbbbb5985e |
|
MD5 | 6fb816c560759daa3a57c3c772466cc0 |
|
BLAKE2b-256 | 925e60a64bc098e3cd759b5461b2d3a50fde37c51b74dd14f448cf386d53ea56 |