Skip to content

jhapendra-kandel/MITM

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

MITM – Educational Man-in-the-Middle Demonstration

Important Disclaimer
This project is created strictly for educational and academic purposes as part of a 1st-year Bachelor's in Cybersecurity university project.
It must NEVER be used on any real, public, or unauthorized network. Performing MITM attacks without explicit written permission is illegal in most countries.

Project Overview

This repository contains a simple Python-based ARP spoofing + packet forwarding tool that demonstrates how a Man-in-the-Middle (MITM) attack works on a local network (LAN).

What it does:

  • Performs ARP cache poisoning on the victim and the gateway/router.
  • Enables IP forwarding so the victim can still access the internet (no immediate suspicion).
  • Allows viewing/sniffing of redirected traffic (e.g., HTTP requests in Wireshark).

Learning Objectives

  • Understand how ARP protocol works and its vulnerabilities.
  • Learn the concept of Man-in-the-Middle attacks.
  • See why encryption (HTTPS, VPN) is crucial.
  • Explore basic network security concepts.

Features

  • ARP spoofing (poisoning) of victim and gateway
  • Automatic IP packet forwarding
  • Graceful restoration of ARP tables on exit (Ctrl+C)
  • Simple command-line interface
  • Easy to extend for packet sniffing, logging, or HTTPS downgrading demos

Requirements

  • Linux (Kali, Ubuntu, Parrot recommended) or macOS
  • Python 3.8+
  • Scapy library (pip install scapy)

Installation

# Clone the repository
git clone https://github.com/YOUR_USERNAME/MITM.git
cd MITM

# Install dependencies
pip install scapy

About

Educational demonstration of ARP-based Man-in-the-Middle (MITM) attack using Python & Scapy – For academic purposes only

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors