Skip to content

Realize Man-In-The-Middle attack on IKEv2 protocol with ARP poisoning.

License

Notifications You must be signed in to change notification settings

freesinger/IKEv2-mitm-attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

IKEv2-mitm-attack

Awesome GitHub code size in bytes GitHub last commit GitHub FOSSA Status

A simple tool for performing Man-In-The-Middle(MITM) attack on Internet Key Exchange version 2 protocal(IKEv2) based on python library scapy.

Dependencies

- python >= 3.6
- scapy
- argparse

Usage

  • Show explicit usage information by run python mitm.py -h in terminal.

  • -i designate network interface to attack with(eg:en0 is default port in Mac)

  • -t1 designate first target to spoof

  • -t2 designate second target to spoof which is actual t1's communication target

  • -f enable IP forwarding(Linux only)

  • -q disable feedback messages

  • -c traces attack duration

Example:

python mitm.py -i en0 -t1 192.168.1.8 -t2 192.168.1.1 -f -q -c

Output:

sample

Validation

I monitor network activities through Wireshark, which gives me the result as screenshot pictured below:

wsharkmonitor

The result shows that we have become MITM between 196.168.1.2 and 192.168.1.1, which grants us the access to their communication information. Furthurmore, we may be able to decrypt the information we captured and change or delete what we want in it.

More

If you are looking for more about MITM, Bettercap is an easy to use, all-in-one solution with all the features you might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.

License

MIT

FOSSA Status

About

Realize Man-In-The-Middle attack on IKEv2 protocol with ARP poisoning.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages