Tool | URL | Description |
---|
Arp0c | http://www.phenoelit.de/arpoc/index.html | A connection interceptor program that uses ARP spoofing. |
arprelay | http://www.zone-h.com/en/download/category=28/ | A tool that forwards IP packets between two machines on an Ethernet that have been told that the MAC address of the other is some random spoofed MAC address. |
dsniff | http://naughty.monkey.org/~dugsong/dsniff/ | A collection of tools for network auditing and penetration testing. |
Fake | http://www.0xdeadbeef.info/ | A utility that takes over an IP address using ARP spoofing. |
fuzzy-fingerprint | http://www.thc.org/thc-ffp/ | A technique that extends common man-in-the-middle (MITM) attacks by generating fingerprints that closely look like the public key fingerprint of the target. |
Hjksuite | http://www.pkcrew.org/tools/hjksuite/ | A collection of programs for hijacking. |
IP Watcher | http://engarde.com | A network security monitor for UNIX that provides the capability to control intruders in real-time. |
Juggernaut | http://www.lot3k.org/tools/spoofing/1.2.tar.gz | A network sniffer that can also be used to hijack sessions. |
NBTdeputy | http://www.zone-h.com/en/download/category=28/ | A tool that registers a NetBIOS computer name on the network and is ready to respond to NetBT name-query requests. |
OTU | http://www.s0ftpj.org/en/site.html | MITM concept code. |
Remote TCP Session Reset | http://www.solarwinds.net | A tool that allows a network administrator to remotely reset a TCP session. |
SMBRelay | http://pr0n.newhackcity.net/~sd/smbrelay.html | A tool that registers a fake SMB server, which can be used for MITM attacks. |
Snarp | http://www.securityfocus.com/tools/1969 | A tool for Windows NT 4.0 that uses an ARP poison attack to relay traffic between two hosts, allowing sniffing of the data on switched networks. |
T-Sight | http://engarde.com | An intrusion detection and network monitoring tool for Windows that can monitor transaction data, control intruders in real-time, set alarms for certain activities, and produce reports or graphs of usage. |
TTY Watcher | http://engarde.com | A host security monitor with active countermeasures. |