Skip to content

Commit af50094

Browse files
author
Caster
committed
v2.5 update
1 parent 7757923 commit af50094

File tree

6 files changed

+591
-979
lines changed

6 files changed

+591
-979
lines changed

README.md

Lines changed: 42 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -22,29 +22,32 @@ Above is a invisible network sniffer for finding vulnerabilities in network equi
2222
2323
## Supported protocols
2424

25-
Detects up to 17 protocols:
25+
Detects up to 22 protocols:
2626

2727
```
2828
MACSec
29+
EAPOL
30+
ARP (Passive ARP)
2931
CDP (Cisco Discovery Protocol)
3032
DTP (Dynamic Trunking Protocol)
31-
802.1Q Tags (VLAN)
3233
LLDP (Link Layer Discovery Protocol)
34+
802.1Q Tags (VLAN)
35+
STP (Spanning Tree Protocol)
3336
OSPF (Open Shortest Path First)
3437
EIGRP (Enhanced Interior Gateway Routing Protocol)
35-
VRRPv2/v3 (Virtual Router Redundancy Protocol)
36-
HSRPv1 (Host Standby Redundancy Protocol)
38+
VRRP (Virtual Router Redundancy Protocol)
39+
HSRP (Host Standby Redundancy Protocol)
3740
GLBP (Gateway Load Balancing Protocol)
38-
STP (Spanning Tree Protocol)
41+
IGMP (Internet Group Management Protocol)
3942
LLMNR (Link Local Multicast Name Resolution)
4043
NBT-NS (NetBIOS Name Service)
4144
MDNS (Multicast DNS)
45+
DHCP (Dynamic Host Configuration Protocol)
4246
DHCPv6 (Dynamic Host Configuration Protocol v6)
47+
ICMPv6 (Internet Control Message Protocol v6)
4348
SSDP (Simple Service Discovery Protocol)
4449
MNDP (MikroTik Neighbor Discovery Protocol)
4550
```
46-
> All protocols are analyzed simultaneously due to the threads design
47-
4851
## Operating Mechanism
4952

5053
Above works in two modes:
@@ -56,29 +59,25 @@ The tool is very simple in its operation and is driven by arguments:
5659

5760
- Interface: Specifying the network interface on which sniffing will be performed
5861
- Timer: Time during which traffic analysis will be performed
59-
- Output pcap: Above will record the listened traffic to pcap file, its name you specify yourself
60-
- Input pcap: The tool takes an already prepared .pcap as input and looks for protocols in it
62+
- Output pcap: Above will record the listened traffic to `.pcap` file, its name you specify yourself
63+
- Input pcap: The tool takes an already prepared `.pcap` as input and looks for protocols in it
64+
- Passive ARP: Detecting hosts in a segment using Passive ARP
6165

6266
```
63-
usage: above [-h] [--interface INTERFACE] [--timer TIMER] [--output-pcap OUTPUT_FILE] [--input-pcap INPUT_FILE]
67+
usage: above.py [-h] [--interface INTERFACE] [--timer TIMER] [--output-pcap OUTPUT_PCAP] [--input-pcap INPUT_PCAP] [--passive-arp]
6468
6569
options:
6670
-h, --help show this help message and exit
6771
--interface INTERFACE
68-
Specify the interface
69-
--timer TIMER Specify the timer value (seconds)
70-
--output-pcap OUTPUT_FILE
71-
Specify the output pcap file to record traffic
72-
--input-pcap INPUT_FILE
73-
Specify the input pcap file to analyze traffic
72+
Interface to capture packets on
73+
--timer TIMER Time in seconds to capture packets
74+
--output-pcap OUTPUT_PCAP
75+
Output filename for pcap file
76+
--input-pcap INPUT_PCAP
77+
Path to the input PCAP file for analysis
78+
--passive-arp Host discovery (Passive ARP)
7479
```
7580

76-
77-
78-
## Traffic Sniffing Demo (Hot mode)
79-
80-
![](/demos/hotmode.gif)
81-
8281
---
8382

8483
## Information about protocols
@@ -153,21 +152,10 @@ First, it's worth switching the interface to promiscuous mode
153152

154153
> Above requires root access for sniffing
155154
156-
### Linux
157155
```bash
158156
caster@kali:~$ sudo ip link set eth0 promisc on
159157
```
160158

161-
### macOS
162-
For Wi-Fi:
163-
Remember to replace `en1` with your target interface.
164-
```bash
165-
/System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport en1 sniff
166-
```
167-
168-
For other:
169-
There is no need to enable promiscuous mode manually for ethernet interfaces, it is done automatically.
170-
171159
Above requires at least an interface and a timer at startup. Choose the timer from your calculations.
172160

173161
```bash
@@ -190,10 +178,29 @@ caster@kali:~$ above --input-pcap dump.pcap
190178

191179
> WARNING! Above is not designed to work with tunnel interfaces (L3) due to the use of filters for L2 protocols. Tool on tunneled L3 interfaces may not work properly.
192180
193-
## PCAP Analyzing Demo (Cold mode)
181+
# Passive ARP
182+
183+
The tool can detect hosts without noise in the air by processing ARP frames in passive mode
194184

195-
![](/demos/coldmode.gif)
185+
```bash
186+
caster@kali:~$ sudo above --interface eth0 --passive-arp
187+
188+
[+] Host discovery using Passive ARP
189+
190+
┌─────────────────────────────────────┐
191+
│ Detected Host │
192+
├─────────────────────────────────────┤
193+
│ Host IP Address: 192.168.0.251 │
194+
│ Host MAC Address: 02:10:de:64:f2:32 │
195+
└─────────────────────────────────────┘
196+
┌─────────────────────────────────────┐
197+
│ Detected Host │
198+
├─────────────────────────────────────┤
199+
│ Host IP Address: 192.168.0.213 │
200+
│ Host MAC Address: 00:0c:27:7f:2b:c6 │
201+
└─────────────────────────────────────┘
196202

203+
```
197204

198205
# Outro
199206

0 commit comments

Comments
 (0)