PacketPlatter is an exploit for network systems, focusing on restaurant ordering platforms. These often use insecure HTTP over Wi-Fi, making them prone to ARP spoofing. PacketPlatter intercepts device traffic via ARP Spoofing, exposing unencrypted data like login credentials and cookies for analysis.
- Python 3.x
- Scapy
-
Clone the repository:
git clone https://github.com/Davim09/PacketPlatter.git cd PacketPlatter
-
Install the dependencies:
pip install scapy
Enable IP Forwarding in root, although the exploit itself already does this, it is what ensures that traffic continues flowing:
echo 1 > /proc/sys/net/ipv4/ip_forward
-
Run the script as root:
sudo python3 packetplatter.py
-
Follow the instructions in the terminal to enter the network interface, target IPs and MACs, and the output pcap file name.