Data Processing
Working in a group of 2, we designed and implemented two programs.
The first program was a network scanner, capable of performing passive and active scans based on the user's choice.
The second program aimed to carry out a "man-in-the-middle" attack, by redirecting all network traffic to the attacker's machine.
These programs were developed for educational purposes and were not tested on public networks or networks belonging to non-consenting individuals.
Specifications
Capture all network frames between two devices without blocking access to network resources.
I decided to exceed the basic requirements of the project, as it particularly interested me.
Implementation
My program offers the following features:
- Redirect all network traffic to the attacker's machine
- Display the most used IP addresses by the machines on the network
- Scan the network we are connected to (thanks to my classmate's script)
- Function in a quasi-autonomous manner