Skip to content

fksvs/inject

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

I N J E C T

Inject is a command line network tool for crafting, injecting, and sniffing a wide range of network protocols. It is designed for users who need a robust tool for detailed network protocol analysis and manipulation, whether for network troubleshooting, testing, or educational purposes.

Table of Contents

  1. Supported Protocols and Key Features
  2. Installation
  3. Usage Examples
  4. License

Supported Protocols and Key Features

  • Multiple Protocol Support : Inject handles Ethernet, ARP, IP, ICMP, TCP and UDP.
  • Network Packet Injecting : Create and send custom network packets on specified network interfaces.
  • Payload Integration: Load payload files into network packets.
  • Network Sniffing : Capture network packets with customizable filtering options to focus on specific network protocols.

Installation

git clone https://github.com/fksvs/inject
git clone https://gitlab.com/fksvs/inject
  • Change directory to inject:
cd inject
  • Build the project:
make

Usage Examples

Ethernet packet with the payload payload.txt to the MAC address 00:11:22:33:44:55 using wlp5s0 network interface:

inject eth -i wlp5s0 -K 00:11:22:33:44:5 -a payload.txt

ARP request from the MAC address 00:11:22:33:44:55 asking who has the IP address 192.168.0.1:

inject arp -i wlp5s0 -K 00:11:22:33:44:55 -S 192.168.1.50 -D 192.168.0.1 -r 1

IP packet from the IP address 192.168.1.40 to the IP address 192.168.1.1 with TTL of 48:

inject ip -S 192.168.1.40 -D 192.168.1.1 -T 48

TCP packet with the payload file payload.txt from the IP address 192.168.1.50 to the IP address 192.168.1.1 with the source port 4444, the destination port 80, and the SYN flag:

inject tcp -S 192.168.1.50 -s 4444 -D 192.168.1.1 -d 80 -f syn -a payload.txt

UDP packet with the payload file payload.txt from the IP address 192.168.0.2 to the IP address 8.8.8.8 with the source port 4444 and the destination port 53:

inject udp -S 192.168.0.2 -s 4444 -D 8.8.8.8 -d 53 -a payload.txt

ICMP packet with the IP address 192.168.0.2 to the IP address 8.8.8.8 with the ICMP type 8 (echo request) and code 0:

inject icmp -S 192.168.0.2 -D 8.8.8.8 -t 8 -C 0

Sniffing all supported network protocol packets:

inject sniff

Sniffing only TCP and UDP packets:

inject sniff -t -u

License

This project is free software; you can redistribute it and/or modify it under the terms of the GPLv3 license. See LICENSE for details.