import os import time import sys import platform from scapy.all import * from tkinter import * from tkinter import messagebox

设置界面

root = Tk() root.title('ARP欺骗检测软件') root.geometry('400x300')

注册界面

def register(): register_window = Toplevel(root) register_window.title('注册') register_window.geometry('300x200') Label(register_window, text='请输入用户名:').pack() username = Entry(register_window) username.pack() Label(register_window, text='请输入密码:').pack() password = Entry(register_window, show='*') password.pack() def register_confirm(): with open('user.txt', 'a') as f: f.write(username.get() + ' ' + password.get() + '\n') messagebox.showinfo('提示', '注册成功!') register_window.destroy() Button(register_window, text='确认', command=register_confirm).pack()

登录界面

def login(): login_window = Toplevel(root) login_window.title('登录') login_window.geometry('300x200') Label(login_window, text='请输入用户名:').pack() username = Entry(login_window) username.pack() Label(login_window, text='请输入密码:').pack() password = Entry(login_window, show='*') password.pack() def login_confirm(): with open('user.txt', 'r') as f: users = f.readlines() for user in users: if user.split()[0] == username.get() and user.split()[1] == password.get(): messagebox.showinfo('提示', '登录成功!') login_window.destroy() return messagebox.showerror('错误', '用户名或密码错误!') Button(login_window, text='确认', command=login_confirm).pack()

ICMP flood攻击检测

def icmp_flood(): sniff_filter = 'icmp' sniff_timeout = 10 sniff_count = 0 sniff_packets = sniff(filter=sniff_filter, timeout=sniff_timeout) for packet in sniff_packets: sniff_count += 1 if sniff_count > 100: messagebox.showwarning('警告', '检测到ICMP flood攻击!') else: messagebox.showinfo('提示', '未检测到ICMP flood攻击!')

TCP攻击检测

def tcp_attack(): sniff_filter = 'tcp' sniff_timeout = 10 sniff_count = 0 sniff_packets = sniff(filter=sniff_filter, timeout=sniff_timeout) for packet in sniff_packets: sniff_count += 1 if sniff_count > 100: messagebox.showwarning('警告', '检测到TCP攻击!') else: messagebox.showinfo('提示', '未检测到TCP攻击!')

ARP欺骗攻击检测

def arp_spoofing(): sniff_filter = 'arp' sniff_timeout = 10 sniff_count = 0 sniff_packets = sniff(filter=sniff_filter, timeout=sniff_timeout) for packet in sniff_packets: sniff_count += 1 if sniff_count > 100: messagebox.showwarning('警告', '检测到ARP欺骗攻击!') else: messagebox.showinfo('提示', '未检测到ARP欺骗攻击!')

扫描局域网主机

def scan_network(): network = '192.168.1.0/24' arp_request = ARP(pdst=network) broadcast = Ether(dst='ff:ff:ff:ff:ff:ff') arp_broadcast = broadcast/arp_request answered_list = srp(arp_broadcast, timeout=1, verbose=False)[0] clients = [] for element in answered_list: client = {'ip': element[1].psrc, 'mac': element[1].hwsrc} clients.append(client) with open('clients.txt', 'w') as f: for client in clients: f.write(client['ip'] + ' ' + client['mac'] + '\n') messagebox.showinfo('提示', '扫描完成!')

检测攻击源

def detect_attack(): with open('clients.txt', 'r') as f: clients = f.readlines() for client in clients: ip = client.split()[0] mac = client.split()[1] sniff_filter = 'arp and src host ' + ip sniff_timeout = 10 sniff_count = 0 sniff_packets = sniff(filter=sniff_filter, timeout=sniff_timeout) for packet in sniff_packets: sniff_count += 1 if sniff_count > 100: messagebox.showwarning('警告', '检测到攻击源IP地址为' + ip + ',MAC地址为' + mac + '!') else: messagebox.showinfo('提示', '未检测到攻击源IP地址为' + ip + ',MAC地址为' + mac + '的攻击!')

创建用户和客户端记录文件

if not os.path.exists('user.txt'): open('user.txt', 'w').close() if not os.path.exists('clients.txt'): open('clients.txt', 'w').close()

创建按钮

register_button = Button(root, text='注册', command=register) register_button.pack(pady=10) login_button = Button(root, text='登录', command=login) login_button.pack(pady=10) icmp_flood_button = Button(root, text='检测ICMP flood攻击', command=icmp_flood) icmp_flood_button.pack(pady=10) tcp_attack_button = Button(root, text='检测TCP攻击', command=tcp_attack) tcp_attack_button.pack(pady=10) ar_spoofing_button = Button(root, text='检测ARP欺骗攻击', command=arp_spoofing) ar_spoofing_button.pack(pady=10) scan_network_button = Button(root, text='扫描局域网主机', command=scan_network) scan_network_button.pack(pady=10) detect_attack_button = Button(root, text='检测攻击源', command=detect_attack) detect_attack_button.pack(pady=10)

root.mainloop()

def enter_func(): # 关闭登录窗口 login_window.destroy() # 创建新窗口 func_window = Toplevel(root) func_window.title('功能页面') func_window.geometry('400x300') # 创建四个功能按钮 icmp_flood_button = Button(func_window, text='检测ICMP flood攻击', command=icmp_flood) icmp_flood_button.pack(pady=10) tcp_attack_button = Button(func_window, text='检测TCP攻击', command=tcp_attack) tcp_attack_button.pack(pady=10) arp_spoofing_button = Button(func_window, text='检测ARP欺骗攻击', command=arp_spoofing) arp_spoofing_button.pack(pady=10) detect_attack_button = Button(func_window, text='检测攻击源', command=detect_attack) detect_attack_button.pack(pady=10) scan_network_button = Button(func_window, text='扫描局域网主机', command=scan_network) scan_network_button.pack(pady=10)

ARP欺骗检测软件 - 抵御网络攻击的利器

原文地址: https://www.cveoy.top/t/topic/jn0x 著作权归作者所有。请勿转载和采集!

免费AI点我,无需注册和登录