README.md in ownlan-0.4.4 vs README.md in ownlan-0.4.6
- old
+ new
@@ -1,9 +1,14 @@
# Ownlan
+[](https://codeclimate.com/github/shideneyu/ownlan)
+
__Ownlan__ aims to be a simple, concise and useful pentesting LAN poisoning suite, Written in ``Ruby`` and using ``PacketFU`` for reading and sending the packets off the wire. I decided to make this suite of tools mainly due do to the lack of existing tools on Linux, on top of helping me understanding the whole process behind the scene. OwnLan got uniques features, with some exclusives and excitings attacks probably never ever used on a (pentesting) network.
+
+
+
## Installation
Add this line to your application's Gemfile:
```ruby
@@ -24,10 +29,15 @@
=> true
## Usage
+:warning: **Important Note** :warning:: Ownlan *does* only work on Linux based computers until I find a way for the gem to parse automatically the current mac address of the given interface in a Cross-Platform way. I might write a gem for this.
+
+### Video Tutorial ###
+[](https://www.youtube.com/watch?v=mAczNeTjMt4 "Ownlan video preview")
+
### Configuration ###
You can pass multiple variables that will be used in the gem.
```ruby
Ownlan.configure do |config|
@@ -65,30 +75,29 @@
Please look at the [cli section](#command-line-interface) for more advanced options.
## Features
-**OwnLan** has four features:
+**OwnLan** has three features:
1. Disconnect one or several users off the wire
2. Protecting users from those kind of attacks
3. Sending custom ARP + DHCP packets easily
-4. Easy ARP packets capture *[Not Implemented]*
### Disconnecting users off the wire
The biggest part of **OwnLan**. It disconnects clients thanks to severals techniques:
- Client side ARP Cache Poisoning (**first duplex**). *The most used and common attack nowadays, the main purpose is to make a MITM attack, but alone (= without IP forwarding), it will disconnect the client. Used by ``TuxCut`` and ``Arpspoof`` . If no MAC Adress is given, yours will be given.*
- Gateway side ARP Cache Poisoning (**second duplex**). *A less known attack and powerful one, used by ``NetCut`` , the principle is to give the gateway a fake correspondancy of the victim MAC Adress to make the later one unreachable. If no MAC Adress is given, yours will be given.*
-- Neighbour Table Overflow attack. *I invented this attack, not to be modest. In fact, I should say 'implemented' since, usually, it is the gateway which is attacked (even so, this one attack is very rare), here, we attack the client directly. I don't think anyone has ever thought of this... and it works! The **NTOA** will not insert random MAC adress, but following a scheme, to ensure that 2 same mac adress won't be injected. So, it makes the attack faster. One client or all clients can be specified.*
+- Neighbour Table Overflow attack. * The Neighbour Table Overflow attack will generate identifications packets to the specified target to completely isolate him from the network. The **NTOA** attack can be used to stress test client (gateway, computers) to see if they can undure heavy charges.
-- Gateway ARP Cache Overflow. *This attack will render the GateWay ARP Cache unusable, and will make a loss of connectivity to all the clients. Some CISCO routers are immuned to this attack though*
+### Protecting clients
-- DHCP Lease Spoofing [Not Implemented]. *This attack will spoof DHCP lease (udp) packet by telling the DHCP server 'Hello, I don't use this IP anymore, just disconnect me' . As of today, this attack is extremly rare, difficult to make, and used only by ``Yersinia`` . There is nothing to prevent this attack, after it has been used. Really.
+- Resynchronize . This feature will instanciate a full duplex ARP attack to resynchronize the client to the Gateway. Very useful against active attacks.
### Command Line Interface
You can also use the provided executable. Simple launch it in accordance to the following scheme:
@@ -102,13 +111,11 @@
* Required: [sub-options]
-p, --protect=<s> Protect a device from lan attacks
* Required: [sub-options]
-b, --broadcast=<s> Broadcast raw ARP packets to the wire.
* Required Options : victim_ip, victim_mac, source_ip, source_mac
- -c, --capture=<s> Sniffing ARP packets on the network [Not Implemented]
-
- where [sub-options] are either:
client Set a First-Duplex disconnection attack (the client is targeted). If no source mac argument, yours will be given (useful for MITM Attacks).
* Required options: victim_ip
@@ -117,21 +124,14 @@
* Required options: victim_ip
* Falcultative options: random_mac , source_mac
ntoa The client is targeted to get disconnected, using a neighbour table overflow attack. Requires a victim ip.
* Required options: victim_ip
* Falcultative options: random_mac
- fake-ip-conflict Generate a fake ip conflict to the victim. Can be used along all the others attacks, or alone.
- * Required options: victim_ip [Not Implemented]
-
resynchronize Operate a dual duplex attack on a victim to disconnect the attacker and heal the victim. Warning: If you are the victim, you will have to fill the optional options.
* Required options: victim_ip
* Optional options: victim_mac , gateway_mac
- stealth Becomes invisible from network scanners, preventing you from getting targeted. [Not Implemented]
- static Set a static ARP Cache for the current session. Good against first-duplex ARP Cache Poisoning. [Not Implemented]
- freeze Reset and Freeze your ARP Cache. Good against NTOAs. [Not Implemented]
-
- Where [Other Options] can be:
-d, --delay=<f> Set the time lapse delay between each packet (default: 0.5)
-i, --interface=<s> Set the network interface which will be used (default: wlan0)
@@ -145,9 +145,21 @@
-n, --version Print version and exit
-h, --help Show this message
+## Security
+
+As a basic form of security __KrakenClient__ provides a set of SHA512 checksums for
+every Gem release. These checksums can be found in the `checksum/` directory.
+Although these checksums do not prevent malicious users from tampering with a
+built Gem they can be used for basic integrity verification purposes.
+
+The checksum of a file can be checked using the `sha512sum` command. For
+example:
+
+ $ sha512sum pkg/kraken_client-0.0.1.gem
+ d12d7d9c2a4fdfe075cbb7a141fa5f2195175891e4098c7e1a28c8bca655ab44fb9d67b6a2e3991d0f852026c5e4537fdf7e314575c68d1c80b3a4b1eb1c041f pkg/kraken_client-0.0.1.gem
## Versioning
__Ownlan__ follows [Semantic Versioning 2.0](http://semver.org/).