@@ -22,29 +22,32 @@ Above is a invisible network sniffer for finding vulnerabilities in network equi
2222
2323## Supported protocols
2424
25- Detects up to 17 protocols:
25+ Detects up to 22 protocols:
2626
2727```
2828MACSec
29+ EAPOL
30+ ARP (Passive ARP)
2931CDP (Cisco Discovery Protocol)
3032DTP (Dynamic Trunking Protocol)
31- 802.1Q Tags (VLAN)
3233LLDP (Link Layer Discovery Protocol)
34+ 802.1Q Tags (VLAN)
35+ STP (Spanning Tree Protocol)
3336OSPF (Open Shortest Path First)
3437EIGRP (Enhanced Interior Gateway Routing Protocol)
35- VRRPv2/v3 (Virtual Router Redundancy Protocol)
36- HSRPv1 (Host Standby Redundancy Protocol)
38+ VRRP (Virtual Router Redundancy Protocol)
39+ HSRP (Host Standby Redundancy Protocol)
3740GLBP (Gateway Load Balancing Protocol)
38- STP (Spanning Tree Protocol)
41+ IGMP (Internet Group Management Protocol)
3942LLMNR (Link Local Multicast Name Resolution)
4043NBT-NS (NetBIOS Name Service)
4144MDNS (Multicast DNS)
45+ DHCP (Dynamic Host Configuration Protocol)
4246DHCPv6 (Dynamic Host Configuration Protocol v6)
47+ ICMPv6 (Internet Control Message Protocol v6)
4348SSDP (Simple Service Discovery Protocol)
4449MNDP (MikroTik Neighbor Discovery Protocol)
4550```
46- > All protocols are analyzed simultaneously due to the threads design
47-
4851## Operating Mechanism
4952
5053Above works in two modes:
@@ -56,29 +59,25 @@ The tool is very simple in its operation and is driven by arguments:
5659
5760- Interface: Specifying the network interface on which sniffing will be performed
5861- Timer: Time during which traffic analysis will be performed
59- - Output pcap: Above will record the listened traffic to pcap file, its name you specify yourself
60- - Input pcap: The tool takes an already prepared .pcap as input and looks for protocols in it
62+ - Output pcap: Above will record the listened traffic to ` .pcap ` file, its name you specify yourself
63+ - Input pcap: The tool takes an already prepared ` .pcap ` as input and looks for protocols in it
64+ - Passive ARP: Detecting hosts in a segment using Passive ARP
6165
6266```
63- usage: above [-h] [--interface INTERFACE] [--timer TIMER] [--output-pcap OUTPUT_FILE ] [--input-pcap INPUT_FILE ]
67+ usage: above.py [-h] [--interface INTERFACE] [--timer TIMER] [--output-pcap OUTPUT_PCAP ] [--input-pcap INPUT_PCAP] [--passive-arp ]
6468
6569options:
6670 -h, --help show this help message and exit
6771 --interface INTERFACE
68- Specify the interface
69- --timer TIMER Specify the timer value (seconds)
70- --output-pcap OUTPUT_FILE
71- Specify the output pcap file to record traffic
72- --input-pcap INPUT_FILE
73- Specify the input pcap file to analyze traffic
72+ Interface to capture packets on
73+ --timer TIMER Time in seconds to capture packets
74+ --output-pcap OUTPUT_PCAP
75+ Output filename for pcap file
76+ --input-pcap INPUT_PCAP
77+ Path to the input PCAP file for analysis
78+ --passive-arp Host discovery (Passive ARP)
7479```
7580
76-
77-
78- ## Traffic Sniffing Demo (Hot mode)
79-
80- ![ ] ( /demos/hotmode.gif )
81-
8281---
8382
8483## Information about protocols
@@ -153,21 +152,10 @@ First, it's worth switching the interface to promiscuous mode
153152
154153> Above requires root access for sniffing
155154
156- ### Linux
157155``` bash
158156caster@kali:~ $ sudo ip link set eth0 promisc on
159157```
160158
161- ### macOS
162- For Wi-Fi:
163- Remember to replace ` en1 ` with your target interface.
164- ``` bash
165- /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport en1 sniff
166- ```
167-
168- For other:
169- There is no need to enable promiscuous mode manually for ethernet interfaces, it is done automatically.
170-
171159Above requires at least an interface and a timer at startup. Choose the timer from your calculations.
172160
173161``` bash
@@ -190,10 +178,29 @@ caster@kali:~$ above --input-pcap dump.pcap
190178
191179> WARNING! Above is not designed to work with tunnel interfaces (L3) due to the use of filters for L2 protocols. Tool on tunneled L3 interfaces may not work properly.
192180
193- ## PCAP Analyzing Demo (Cold mode)
181+ # Passive ARP
182+
183+ The tool can detect hosts without noise in the air by processing ARP frames in passive mode
194184
195- ![ ] ( /demos/coldmode.gif )
185+ ``` bash
186+ caster@kali:~ $ sudo above --interface eth0 --passive-arp
187+
188+ [+] Host discovery using Passive ARP
189+
190+ ┌─────────────────────────────────────┐
191+ │ Detected Host │
192+ ├─────────────────────────────────────┤
193+ │ Host IP Address: 192.168.0.251 │
194+ │ Host MAC Address: 02:10:de:64:f2:32 │
195+ └─────────────────────────────────────┘
196+ ┌─────────────────────────────────────┐
197+ │ Detected Host │
198+ ├─────────────────────────────────────┤
199+ │ Host IP Address: 192.168.0.213 │
200+ │ Host MAC Address: 00:0c:27:7f:2b:c6 │
201+ └─────────────────────────────────────┘
196202
203+ ```
197204
198205# Outro
199206
0 commit comments