SkillAgentSearch skills...

Blackvenom

BlackVenom is a personal project designed for ethical ARP and DNS spoofing πŸ›‘οΈ. It helps cybersecurity professionals practice network traffic interception and vulnerability identification πŸ“„, all while adhering to ethical hacking standards βš–οΈ. Ideal for learning and enhancing network security skills.

Install / Use

/learn @sergio11/Blackvenom
About this skill

Quality Score

0/100

Category

Design

Supported Platforms

Universal

README

πŸ•·οΈ BlackVenom: The Ethical ARP and DNS Spoofing Tool for Cybersecurity πŸ•ΈοΈ

BlackVenom is a personal project developed as part of my learning journey during a Cybersecurity course. πŸ§‘β€πŸ’» The tool is designed for ethical hackers and cybersecurity professionals to practice and enhance their skills in ARP and DNS spoofing, a key technique used to intercept network traffic and identify network vulnerabilities. πŸ›‘οΈ

Created as a hands-on project to explore real-world network manipulation techniques in a controlled environment, BlackVenom allows users to practice penetration testing and vulnerability analysis. Through this project, I learned how to detect misconfigurations and weaknesses in networks by manipulating ARP tables and spoofing DNS requests, all while remaining undetected. πŸ•΅οΈβ€β™‚οΈβš‘

Built with stealth and precision in mind, BlackVenom enables a deep dive into network traffic analysis for educational purposes. This project is designed to empower both beginners and professionals to better understand how to identify vulnerabilities and secure networks against potential exploits. πŸ–€

πŸ™ A special thanks to Santiago HernΓ‘ndez, a leading expert in Cybersecurity and Artificial Intelligence, whose Cybersecurity and Ethical Hacking course on Udemy guided me through many aspects of network security. The knowledge and techniques gained from this course were pivotal in the development of this project.

Join me in exploring BlackVenom, a tool built for educational purposes to help enhance cybersecurity skills and better understand how vulnerabilities can be uncovered through ethical hacking practices! πŸ•ΈοΈβœ¨

<p align="center"> <img src="https://img.shields.io/badge/Kali_Linux-557C94?style=for-the-badge&logo=kali-linux&logoColor=white" /> <img src="https://img.shields.io/badge/Python-FFD43B?style=for-the-badge&logo=python&logoColor=blue" /> </p> <p align="center"> <img src="doc/screenshots/picture_1.PNG" /> </p>

⚠️ Disclaimer

BlackVenom was developed exclusively for educational and research purposes as part of my learning experience in cybersecurity and ethical hacking. This project serves as a practical application of the knowledge acquired during a cybersecurity course, allowing me to experiment in a controlled lab environment and include it in my cybersecurity portfolio.

This tool is intended only for ethical and authorized security testing. Any use outside of legal and authorized environmentsβ€”such as penetration testing labs, cybersecurity research, or approved security assessmentsβ€”is strictly prohibited.

Unauthorized use of BlackVenom on external systems is illegal and may violate laws.

I assume no responsibility for misuse of this tool. Always operate within legal and ethical boundaries and obtain explicit permission before conducting any network security tests.

Key Features of These Tools:

  • 🌐 ARP Spoofing Mastery: Learn how to conduct bidirectional ARP spoofing to impersonate devices and intercept traffic between them. This is an important technique in network penetration testing and an essential skill for ethical hackers.

  • πŸ” DNS Spoofing Capabilities: Gain practical experience with DNS spoofing, where you can manipulate DNS requests to redirect users to malicious sites. This technique helps you understand how attackers can hijack DNS resolutions and perform phishing or man-in-the-middle attacks.

  • πŸ“„ Traffic Logging: Capture and log all intercepted network traffic using PCAP files. Traffic logging is a key skill in network forensics and security audits, allowing you to analyze intercepted data to uncover vulnerabilities and misconfigurations.

  • βš™οΈ Ethical & Stealthy: All tools are built with an ethical hacking mindset, ensuring you can conduct your assessments and tests without leaving traces. This helps you understand how to remain undetected while discovering security weaknesses.

<p align="center"> <img src="doc/screenshots/picture_2.PNG" /> </p>

Use Cases:

  • Network Penetration Testing: Perform thorough assessments of network security by identifying vulnerabilities in ARP protocols and DNS resolutions. Practice simulating real-world attacks on a network to understand potential weaknesses.

  • Security Auditing: Utilize these tools to log and analyze network traffic, uncovering potential vulnerabilities and weaknesses. This hands-on approach will help you improve your security auditing skills.

  • Educational Purposes: These tools are perfect for learning and teaching key network security concepts. By experimenting with ARP and DNS spoofing, you’ll gain a deeper understanding of how these techniques are used in real-world attacks and defenses.

  • Traffic Analysis: Monitor and capture network traffic for forensic investigations or behavioral analysis. This helps you understand the significance of traffic patterns in identifying security flaws and improving network defenses.

<p align="center"> <img src="doc/screenshots/picture_3.PNG" /> </p>

Understanding ARP Spoofing and DNS Spoofing πŸ”

  • ARP Spoofing: This technique involves sending false ARP (Address Resolution Protocol) messages over a local area network. By doing so, an attacker can associate their MAC address with the IP address of another device (e.g., the default gateway), allowing them to intercept and manipulate traffic intended for that device. This can lead to various attacks, including man-in-the-middle attacks and session hijacking. ⚠️

  • DNS Spoofing: This technique manipulates DNS (Domain Name System) responses to redirect traffic from legitimate websites to malicious ones. By altering the DNS records, an attacker can control what IP addresses users are directed to when they attempt to access specific domains. This can be used to carry out phishing attacks or serve malicious content. 🌐

<p align="center"> <img src="doc/screenshots/picture_4.PNG" /> </p>

IP Forwarding and IPTABLES πŸ“‘

For BlackVenom to successfully intercept and forward traffic between the target and gateway, IP forwarding must be enabled on the system. This allows the machine running BlackVenom to act as a bridge, forwarding packets between the target and the network.

To enable IP forwarding, use the following command:

echo 1 > /proc/sys/net/ipv4/ip_forward

Additionally, you may need to configure IPTABLES to allow forwarding of packets. Here’s a basic command to set up the necessary rules:

iptables -A FORWARD -i eth0 -j ACCEPT
iptables -A FORWARD -o eth0 -m state --state RELATED,ESTABLISHED -j ACCEPT

These commands ensure that the traffic can flow through the machine while BlackVenom performs its operations. πŸ›‘οΈ

Key Techniques in BlackVenom Development πŸ› οΈ

  • NetFilterQueue: This library allows the interception of packets within the Linux kernel's Netfilter framework. It provides a powerful way to capture and manipulate network packets, making it an essential tool for implementing ARP and DNS spoofing techniques. πŸ₯…

  • Scapy: A powerful Python library used for packet manipulation, Scapy allows for the creation, sending, and receiving of network packets. It's crucial for constructing ARP and DNS packets needed for spoofing. πŸ“¦

  • Threading: To ensure that the tool operates efficiently without blocking the main execution thread, threading is utilized to manage concurrent packet processing for both ARP and DNS spoofing operations. 🧡

  • Traffic Logging: Using libraries like pcap and tqdm, BlackVenom captures and logs network traffic in real-time, providing a comprehensive analysis of intercepted packets for further examination. πŸ“Š

Dependencies πŸ“¦

BlackVenom requires several Python packages to function effectively. Below are the key dependencies along with their respective versions:

  • scapy==2.6.0 🐍: A powerful Python library for network packet manipulation, allowing the creation, sending, and sniffing of network packets.
  • tqdm==4.65.0 ⏳: A fast, extensible progress bar for Python, used to provide visual feedback during long-running tasks.
  • rich==13.9.2 🌈: A library for rich text and beautiful formatting in the terminal, enhancing the output of the tool with colors and styles.
  • netifaces==0.11.0 🌐: A cross-platform library to get network interface information, useful for identifying available interfaces for ARP spoofing.
  • NetfilterQueue==1.1.0 πŸ”„: A Python binding to the netfilter queue library, allowing the manipulation of packets in user space for packet filtering and modification.

Ensure that these dependencies are installed in your Python environment to use BlackVenom effectively. βœ…

Installation πŸ› οΈ

To install and run BlackVenom, follow these simple steps:

1. Create a Python Virtual Environment 🐍

First, create a virtual environment to manage dependencies:

python -m venv BlackVenom-Kali

2. Activate the Virtual Environment πŸ”‘

Activate the virtual environment:

source BlackVenom-Kali/bin/activate

3. Install Dependencies πŸ“¦

Now, install the necessary dependencies from the requirements.txt file:

pip install -r requirements.txt
  1. Run the Tool ⚑ After installation, you can run BlackVenom using the provided CLI:
python black_venom_cli.py

Usage Examples

Example 1: Basic ARP Spoofing

This command performs a basic ARP spoofing attack between a target and a gateway without enabling packet logging or DNS spoofing. πŸ”—

sudo python black_venom_cli.py \
    --target_ip 192.168.11.128 \
    --gateway_ip 192.168.11.2 \
    --interface eth0

Example 2: ARP Spoofing with Traffic Logging

In this example, packet logging is enabled while performing ARP spoofing. πŸ“

sudo python blac
View on GitHub
GitHub Stars23
CategoryDesign
Updated11d ago
Forks2

Languages

Python

Security Score

90/100

Audited on Mar 10, 2026

No findings