Skip to content

PacketPlatter is an exploit for network systems, focusing on restaurant ordering platforms. These often use insecure HTTP over Wi-Fi, making them prone to ARP spoofing. PacketPlatter intercepts device traffic via ARP Spoofing, exposing unencrypted data like login credentials and cookies for analysis.

Notifications You must be signed in to change notification settings

Davim09/PacketPlatter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PacketPlatter

PacketPlatter is an exploit for network systems, focusing on restaurant ordering platforms. These often use insecure HTTP over Wi-Fi, making them prone to ARP spoofing. PacketPlatter intercepts device traffic via ARP Spoofing, exposing unencrypted data like login credentials and cookies for analysis.

Exploit of this Article

Requirements

  • Python 3.x
  • Scapy

Installation

  1. Clone the repository:

    git clone https://github.com/Davim09/PacketPlatter.git
    cd PacketPlatter
  2. Install the dependencies:

    pip install scapy

    Enable IP Forwarding in root, although the exploit itself already does this, it is what ensures that traffic continues flowing:

    echo 1 > /proc/sys/net/ipv4/ip_forward

Usage

  1. Run the script as root:

    sudo python3 packetplatter.py
  2. Follow the instructions in the terminal to enter the network interface, target IPs and MACs, and the output pcap file name.

Example Execution

About

PacketPlatter is an exploit for network systems, focusing on restaurant ordering platforms. These often use insecure HTTP over Wi-Fi, making them prone to ARP spoofing. PacketPlatter intercepts device traffic via ARP Spoofing, exposing unencrypted data like login credentials and cookies for analysis.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages