Man-in-the-middle attacks

Project attribution: Project done in collaboration with Teodor Lungu.
Source: The project’s source code is available here.
Short description: Python app that executes standard man-in-the-middle attacks: ARP table poisoning, DNS spoofing and TCP Telnet session hijackin.
Technologies: Python, Tkinter, Scapy.
What I did: I implemented the GUI and the ARP and DNS attacks, but also helped around with polishing the TCP hijacking.

We designed and implemented a lightweight tool in Python using the Scapy network packets manipulation library, for 3 network attacks: ARP table poisoning, DNS spoofing and TCP Telnet session hijacking. I also implemented a GUI with the Tkinter library for ease of use.

First panel. It displays the available hosts in a list.
ARP Poisoning panel after successful poisoning.
DNS Spoofing panel after successful spoofing.
Error handling for DNS spoofing when the user did not execute ARP table poisoning beforehand to become MITM.
TCP session hijacking panel before initiating the attack.