NetworkAlarm

21 May 2018

Contents

See this project on GitHub

A command-line tool to monitor local network traffic for possible security vulnerabilities. Warns user against possible nmap scans, Nikto scans, credentials sent in-the-clear, credit card numbers sent in-the-clear, and shellshock attacks. Currently supports live monitoring and network capture (pcap) scanning.


Vulnerability Monitoring

Installation

All requirements are listed in the requirements.txt file. Use pip to install:

pip install -r requirements.txt

Running

Simply run with python, no arguments necessary. NetworkAlarm will default to sniffing on the eth0 interface. Users can specify what interface or pcap to sniff on.

python alarm.py [-h] [-i INTERFACE] [-r PCAPFILE]

A network sniffer that identifies basic vulnerabilities

optional arguments:
  -h, --help    show this help message and exit
  -i INTERFACE  Network interface to sniff on
  -r PCAPFILE   A PCAP file to read

NetworkAlarm will print its findings to stdout as well as print it to a log file named after the current datetime (logs/YYYY-MM-DD_HH:MM:SS.log)