• Home
  • Submit Paper
  • Check Paper Status
  • Download Certificate/Paper
  • FAQs
  • Feedback
  • Contact Us
Email: ijraset@gmail.com
IJRASET Logo
Journal Statistics & Approval Details
Recent Published Paper
Our Author's Feedback
 •  ISRA Impact Factor 7.894       •  SJIF Impact Factor: 7.538       •  Hard Copy of Certificates to All Authors       •  DOI by Crossref for all Published Papers       •  Soft Copy of Certificates- Within 04 Hours       •  Authors helpline No: +91-8813907089(Whatsapp)       •  No Publication Fee for Paper Submission       •  Hard Copy of Certificates to all Authors       •  UGC Approved Journal: IJRASET- Click here to Check     
  • About Us
    • About Us
    • Aim & Scope
  • Editorial Board
  • Impact Factor
  • Call For Papers
    • Submit Paper Online
    • Current Issue
    • Special Issue
  • For Authors
    • Instructions for Authors
    • Submit Paper
    • Download Certificates
    • Check Paper Status
    • Paper Format
    • Copyright Form
    • Membership
    • Peer Review
  • Past Issue
    • Monthly Issue
    • Special Issue
  • Pay Fee
    • Indian Authors
    • International Authors
  • Topics
ISSN: 2321-9653
Estd : 2013
IJRASET - Logo
  • Home
  • About Us
    • About Us
    • Aim & Scope
  • Editorial Board
  • Impact Factor
  • Call For Papers
    • Submit Paper Online
    • Current Issue
    • Special Issue
  • For Authors
    • Instructions for Authors
    • Submit Paper
    • Download Certificates
    • Check Paper Status
    • Paper Format
    • Copyright Form
    • Membership
    • Peer Review
  • Past Issue
    • Monthly Issue
    • Special Issue
  • Pay Fee
    • Indian Authors
    • International Authors
  • Topics

Ijraset Journal For Research in Applied Science and Engineering Technology

  • Home / Ijraset
  • On This Page
  • Abstract
  • Introduction
  • References
  • Copyright

Unavailability of Python Tool Which Can Perform Various Hacking Activities

Authors: Abhishek Gadge, Atharv Temkar, Pranav R. Shriram, Ahmad Raza Qadri, Shraddha Choudhary

DOI Link: https://doi.org/10.22214/ijraset.2022.41875

Certificate: View Certificate

Abstract

Multi Technique Hacking is implemented with all three functions in a single interface, that is, Http Packet Credential Harvesting, IP Spoofing and Packet Modification and There is no existing system in which all the functions have been used together. It describes how the process is done and how they go about helping their customers find and plug up security holes. The hacking process is explained, along with many of the challenges and opportunities in the field of ethical hacking. This hacking technique is done using scapy library which is a very big library with plenty of functions available for use. To understand the working of the library firstly the practice has to be done using the library and then try to implement it in the code. Ethical hacking, also known as penetration testing, penetration testing, or the red team, has become a major concern for businesses and governments. Companies are concerned about the possibility of being hacked and prospects are concerned about managing their personal information. This Paper describes how the process works and helps customers find and close security gaps. The hacking process is described with many challenges and opportunities in the field of ethical hacking

Introduction

I. INTRODUCTION

In the current era of digitalization and advanced networking we need knowledge about protecting our privacy and digital network. Doing so may result in using some tools to perform attacks on our network to test the level or protection of our systems. To ease the task of performing network attacks, there is a tool which can use multiple techniques to perform the attacks, i.e., Multi Technique Hacking Tool. This Paper provides minimal guidelines (and requirements) for multi-technical hacking tools. It is a model and guide for multi-technique hacking tools. Aim is to develop the tools that can use Python's Scapy library to eavesdrop on credentials, IP spoofing, and modify packets and our tool will be able to perform all this operation. This is basically a hacking attempt to gain unauthorized access to information by acting as a system or network change or its weakness. The structure of this manual is as follows. Section 2 (Methods and Materials) provides details of the device or device modification specifically designed for investigation and a diagram of the modification, if applicable. Section 3 (Results and Discussion) describes the findings and an analysis of these results.  

II. LITERATURE REVIEW

A. Related work And State of the Art (Latest work)

Craig S Wright et al [1] explained how to follow the shellcode and interpret the jumps and calls it contains. It can be said that shellcode has a shelf life. As samples become more common and widely used in the underground community, they are gradually being added to IDS and antimalware signatures. Extensive shellcode, which is also used in Metasploit projects, has a particularly short lifespan.

This doesn't mean it's useless for many websites, but it can be less valuable when testing secure websites. In many cases, changing a small piece of shellcode can cause the generated signature to detect, warn, and block and invalidate it. For example, make minor changes to existing shellcode that runs "/ bin / csh" instead of the standard call "/ bin / sh". You can extend the validity period of the shellcode. Once you've learned how shellcode is created and formed, you can also start modifying and extending shellcode, executing various payloads, or modifying forms to avoid detection.

Rohith Raj S [2] Scapy is very robust and very easy to use. Scapy is very useful for rapid security analysis. But if I want to review it from time to time, I can draw your own conclusions without spending raw. No actual explanation is needed. Scapy has a number of very good user and developer methods to help you work with packages. If the programmer needs to use a custom package to get results. Scapy, which tests firewall or intrusion detection system methods, is very useful when responding to custom packets. The really nice thing about A Scapy is that it can be used as Python.

A library that allows you to create and create programs. Apply your application very quickly without digging deeper. The details of how to create a raw package from scratch can help significantly reduce the size of your code. In short, it gives us the freedom to try whatever we can. Visualize over the network.

Roshan Poudél [3] Develop a step-by-step packet sniffer using Python and Scapy. including:

Step 1- shows the installation of scapy on the operating system.

Step 2- is to create a Python file and import the module.

Step 3- Create the function in step 3. You can also use the prn parameter to help sniff packets continuously.

Step 4- is to classify the packets into TCP and UDP. Step 5- classifies packets into incoming and outgoing packets.

Step 6- is to print all the information you need on the console.

Jiajia Chen et al [4] To understand today's network applications, the survey analyzed the traffic characteristics of Internet applications. In this document, response time is calculated by combining HTTP traffic request and response messages. In addition, a statistical analysis of this response time is performed.

Traditional passive network measurement technology used to capture web traffic. Analysis shows that the top 10 web servers have response times of 199.78ms for Nginx, 253.25ms for Apache, 198.19ms for IIS, 89.34ms for Tengine, Cafe 190.66ms, AmazonS3 260.86ms, ECS 284.39ms, ATS 256.52ms, Openresty. 214.12ms, DnionOS127.36ms. Philippe BIONDI [5] Described packet generation and network-based attacks using scapy.

The prior art includes a rapid target classification method for packaging tools. When the problem of the tool is discussed and the tool cannot accurately forge the requirements or interpret what is obtained. Below is a step-by-step breakdown of packet operations, sniffing, and PCAP file format interfaces, various types of package lists, and high-level commands. Finally, before drawing any conclusions, let's talk about network detection and attacks.

B. Limitation of State-of-the-Art Techniques  

This is available on the Debian Linux operating system; preferably Kali Linux; Here, Python 3 is installed with the Scapy framework of Python. The user also needs to make sure they have an external Wi-Fi card to make sure that surveillance mode is enabled and packets are being captured.

C. Discussion and future direction

This is strictly to be used for educational and ethical purposes and is advised to be used with a virtual machine before being used on a real project / OS.  

III. METHODS AND MATERIAL

This tool is available on the Debian Linux operating system; preferably Kali Linux; Here, Python 3 is installed with the Scapy framework of Python. Python's Tkinter GUI.

The user also needs to make sure they have an external Wi-Fi card to make sure that surveillance mode is enabled and packets are being captured. Following attacks will be done by our tool:

A. Approach 

The user can select the type of attack they want to perform and then they have to fill in the details for the type of attacks they want to perform. In first attack, a http website has to be open and then the code needs to be executed, and then the code will do the sniffing and ask to save the credentials in a file.  In the second attack the user has to fill in the IP address and ports to direct the spoofed packets.  In the third attack, the user will have to fill in all the various fields that are needed in the packet modifier.  

 B. Architecture of Systems 

In Figure I, we can see the architecture as well as data flow of the proposed system. There are 3 tools in our system. Firstly, user has to choose a tool which he/she has to perform.

C. If user Select

  1. Credential Harvesting: This will give user option whether to save the data or not, after that model will start sniffing the packet after completion it will harvest the credentials and display or save the data whichever the user has chosen.
  2. IP Spoofing: After selecting the tool, user will have to enter spoofing IP after that tool will replace original IP with spoofed IP and display new packet (with replaced IP) followed by sending spoofed packet in a loop.
  3. Packet Modification: In this tool, user will have a choice of TCP and UDP after selecting one, user will have to enter some field like mac, source IP, destination IP, source port, destination port after entering the details tool will display new packet and send it to destination.  

D. Analysis of Tools 

1. HTTP Credential Harvesting

a. Description: This attack will sniff out the user credentials of the target’s HTTP packets. 

b. Response Sequences: Once the user selects from the main menu the choice 1, he will be redirected to the menu for this attack, which will ask the user If the credentials need to be saved to a file or should the attack proceed without saving credentials in a file.

c. Functional Requirements: Scapy for scanning the network packets and filtering them according to the protocol

2. IP Spoofing

a. Description: This attack will send spoofed IP packets to the target system.  

b. Response Sequences: Once the user selects from the main menu the choice 2, he will be redirected to the menu for this attack, which will ask the user for the new IP address which will be replaced in the original packet and then the packet will be sent to the target with a spoofed source IP.  

c. Functional Requirements: Scapy, for replacing the IP address in the packet with the new IP.  

3. Packet Modification

a. Description: This attack will help the user to modify the packet with new parameters. 

b. Response Sequences: Once the user selects from the main menu the choice 3, he will be redirected to the menu for this attack, which will ask the user for the fields that are modifiable in the packet and then the modified packet will be sent to the target.  

c. Functional Requirements: Scapy, for ensuring that the packets are modified or a new packet is created from scratch. 

IV. RESULTS AND DISCUSSION

A. HTTP Sniffing

Figure 1 describes Menu and Input examples for HTTP cred sniffing.

B. Saved Credentials in a File

Figure 2 describes Output of HTTP cred sniffing saved in a separate txt file by default  

C. IP Spoofing Menu

Figure 3 describes Menu and Input examples for IP spoofing

D. IP Spoofing Packet

Figure 4 shows Output of IP spoofing, with the raw packet and sent packet count.

E. Packet Modification Menu

Figure 5 shows Menu and Input examples for Packet Modification.

F. Modified Packet

Figure 6 depicts Output of Packet modification, with the raw packet before it is sent.

References

[1] https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3153525 [2] https://ieeexplore.ieee.org/document/8903954 [3] https://www.exploit-db.com/docs/48606 [4] https://www.researchgate.net/publication/311757131_Analysis_of_web_traffic_based_on_HTTP_protocol [5] https://scapy.net/conf/scapy_T2.pdf [6] Bansal S, Bansal N (2015) Scapy – A Python Tool Für Security Test. J Comput Sci Syst Biol 8: 140159. doi: 10.4172 /jcsb.1000182. [7] Biondi, P. (2018). Scapy: Python2 and Python3 package creation. [8] Duchene, J., Le Guernic, C., Alata, E., Nicomette, V. , And Kaaniche, M. (2018). State-of-the-art Network Pro ˆ An exemplary network protocol draft 737tocol reverse engineering tool for security testing of industrial automation systems. Journal of Computer Virology and Hacking Techniques, 14 (1): 53-68 [9] Potter, B. and McGraw, G. (2004). Software security testing. IEEE Security and Data Protection, 2 (5): 81–85. [10] P.Biondi,2002 Linux Net filter NAT/ICMP code information leak [11] http://secdev.org/conf/scapy_T2.pdf [12] http://secdev.org/conf/scapy_csw05.pdf [13] https://scapy.readthedocs.io/en/latest/usage.h tml [14] Learning Python by O’Reilly and Mark Lutz

Copyright

Copyright © 2022 Abhishek Gadge, Atharv Temkar, Pranav R. Shriram, Ahmad Raza Qadri, Shraddha Choudhary. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

ijraset41875Abhishek

Download Paper

Authors : Abhishek Gadge

Paper Id : IJRASET41875

Publish Date : 2022-04-26

ISSN : 2321-9653

Publisher Name : IJRASET

DOI Link : Click Here

About Us

International Journal for Research in Applied Science and Engineering Technology (IJRASET) is an international peer reviewed, online journal published for the enhancement of research in various disciplines of Applied Science & Engineering Technologies.

Quick links
  • Privacy Policy
  • Refund & Cancellation Policy
  • Shipping Policy
  • Terms & Conditions
Quick links
  • Home
  • About us
  • Editorial Board
  • Impact Factor
  • Submit Paper
  • Current Issue
  • Special Issue
  • Pay Fee
  • Topics
Journals for publication of research paper | Research paper publishers | Paper publication sites | Best journal to publish research paper | Research paper publication sites | Journals for paper publication | Best international journal for paper publication | Best journals to publish papers in India | Journal paper publishing sites | International journal to publish research paper | Online paper publishing journal

© 2022, International Journal for Research in Applied Science and Engineering Technology All rights reserved. | Designed by EVG Software Solutions