This is a proof of concept. A tool developed at Universidad Tecnologica Nacional (Argentina).
It detects attacks and it responses with isolation attacks. It's supposed to be on the same network of the protected hosts. It must be capable to see all the traffic. It's a basic IPS with a self defense module. So it can prevents future attacks from the same hosts, which is identified by its mac address.
Features
- detects scans TCP: fin, syn, xmas, null, ack
- detects scans by analyzing timming
- detects MiTM attacks: arp poisoning
- detects malfomred packets: IP y Ethernet
- detects NOPS in protocolos FTP fileds USER and PASS
- responses an attackers with arp poisoning
- possibility of enable the "attack the attacker"
- choosing between atacks that can be detected
- NIC can be chosen for sniffing and attacking
Categories
MiTM (Man-in-The-Middle) AttackFollow sape
Other Useful Business Software
Host LLMs in Production With On-Demand GPUs
Deploy your model, get an endpoint, pay only for compute time. No GPU provisioning or infrastructure management required.
Rate This Project
Login To Rate This Project
User Reviews
-
Great engine for starting filters and actions