The network sniffer detects the following events occurring on the network you're on:
- NULL scan
- FIN scan
- Xmas scan
- Usernames and passwords sent unencrypted via HTTP basic authentication or FTP
- Nikto scan
- Somebody scanning for Remote Desktop Protocol (RDP)
Run the network sniffer by running python3 network_sniffer.py [args]. The arguments are as follows:
-i [INTERFACE]: Sniff on a specified network interface
-r [PCAPFILE]: Read in a PCAP file
-h: Display message on how to use tool
If no arguments are given, it will automatically sniff on the network interface eth0.
You will need Python 3, Scapy, and Pcapy.
This script does not work on Windows at this time. It only works on Linux. I don't know if it works on a Mac because I don't own one. I will add support for Windows in the future. I can't make any promises for Macs, though.