Nyakloud - SAE Traitement de données

Data Processing

Working in a group of 2, we designed and implemented two programs.

The first program was a network scanner, capable of performing passive and active scans based on the user's choice.

The second program aimed to carry out a "man-in-the-middle" attack, by redirecting all network traffic to the attacker's machine.

These programs were developed for educational purposes and were not tested on public networks or networks belonging to non-consenting individuals.

Specifications

Capture all network frames between two devices without blocking access to network resources.

I decided to exceed the basic requirements of the project, as it particularly interested me.

Implementation

My program offers the following features:

  • Redirect all network traffic to the attacker's machine
  • Display the most used IP addresses by the machines on the network
  • Scan the network we are connected to (thanks to my classmate's script)
  • Function in a quasi-autonomous manner