• mine craft! mc.floofey.dog:25565

Control of users on the network using Evillimiter

In this guide, I decided to describe a way to control users in WiFi networks (and not only) using a script with the graceful name Evillimiter. The very operation of this program is not complicated, so I will not dwell here long. On a simple example I will present the use of this program and briefly describe the individual functions of the program. The script's operation is based on ARP spoofing and effectively blocks specific users from accessing network resources (of course, the script itself can limit the bandwidth for a specific host on the network, which extends our capabilities in operation). Its use is very easy and the script itself is available for download here:



VERSION FOR LINUX:



LINK



VERSION FOR WINDOWS



LINK



Once we have downloaded and installed the script (following the instructions in the readme file), run our script and scan the entire network to find all hosts. We give commands:



Code:
python3 evillimiter

Code:
scan --range 192.XXX.X.X / 24

After the program scans the network, we display a list of hosts. We give the command:



Code:
hosts --force

Now in the program window we should see a list of all devices available on the network. Now, if we want to block any of them from accessing the network, simply issue the command



Code:
block DEVICE_IP_ADDRESS

Similarly, if we want to reverse this process, just tap on the program window:



Code:
free DEVICE_IP_ADDRESS

As you can see, the use of this script is trivial and even a child would manage without problems. As I mentioned earlier, its device is not limited to blocking access to the network. Below I will briefly describe its individual functions:



As you can see the script has many functionalities. I hope you will love this script as much as I do.

Have fun






cat-jam.gif
About author
FaustineSpirit
Say something about yourself... hmmm... a freelancer, internet citizen, a guy who likes to sit and look at things he shouldn't be looking at. The deeper the rabbit hole, the more to explore:D

Interests: Computer forensics, OSINT and other reconnaissance methods, wireless network security, OPSEC and anonymization of operations, APT (Advanced Persistent Threats), Social engineering, amateur researcher and pro-bono advising on security issues, intrusion analysis and security incidents, forensics, implementation of effective security policies in the company.

You say enigma? ... I don't mind ...

Comments

There are no comments to display.
  • Insert:
Attach files Max attachment size: 25 MB. Video: 25 MB

Article information

Author
2xTheTap115
Views
510
Last update

More in Tutorials & guides

More from 2xTheTap115

Share this article

/pub/ ~ public channel
Help Users
      namba5 @ namba5: brugh my ass is failing to use a chatbox so hard jesus heroin-huffing christ
      Back
      Top