This tool is Basically use for Packet Snifing in Man In The Middle attack. Here we can intercept the HTTP header, TCP header, IP header and also Ethernet header. Here we can filter the port also by edit the htsnifing.py file "sniff(filter = '<dst/src port port_number>', prn = process_packet, iface = iface, store=False)". Here we also can dump the all http request data.
packet_snifing required python 3.10.0 to install Successfully. To install, just run the below command.
git clone https://github.com/Kishan7384/packet_snifing.git
cd packet_snifing
python3 -m pip install -r requirements.txt
python3 htsnifing.py -h
This will display help for the tool. Here are all the switches it supports.
usage: python3 htsnifing.py -i interface
This is tool is Basically snif the Packets.
options: -h, --help show this help message and exit -i IFACE, --iface IFACE Enter The interface name where you want to snif the packets -p PROTOCOL, --protocol PROTOCOL Enter The protocol Name <http/all(http/tcp/ip)>.
python3 htsnifing.py -i eth0 -p http
python3 htsnifing.py -i eth0 -p all