dsniff is a collection of tools for network auditing and penetration testing.
dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.).
The name dSniff refers both to the package of such tools and one eponymous tool (“dSniff”) included within.
Key Features
- arpspoof – redirect packets from a target host (or all hosts) on the LAN intended for another local host by forging ARP replies.
- dnsspoof – forge replies to arbitrary DNS address / pointer queries on the LAN.
- dsniff – password sniffer. handles FTP, Telnet, SMTP, HTTP, POP, poppass, NNTP, IMAP, SNMP, LDAP, Rlogin, RIP, OSPF, PPTP, MS-CHAP, NFS, VRRP, YP/NIS, SOCKS, X11, CVS, IRC, AIM, ICQ, Napster, PostgreSQL, Meeting Maker, Citrix ICA, Symantec pcAnywhere, NAI Sniffer, Microsoft SMB, Oracle SQL*Net, Sybase and Microsoft SQL auth info.
- filesnarf – saves selected files sniffed from NFS traffic in the current working directory.
- macof – flood the local network with random MAC addresses (causing some switches to fail open in repeating mode, facilitating sniffing).
- mailsnarf – a fast and easy way to violate the Electronic Communications Privacy Act of 1986.
- msgsnarf – record selected messages from sniffed AOL Instant Messenger, ICQ 2000, IRC, and Yahoo! Messenger chat sessions.
- sshmitm – SSH monkey-in-the-middle. proxies and sniffs SSH traffic redirected by dnsspoof, capturing SSH password logins, and optionally hijacking interactive sessions.
- tcpkill – kills specified in-progress TCP connections.
- tcpnice – slow down specified TCP connections via “active” traffic shaping.
- urlsnarf – output selected URLs sniffed from HTTP traffic in CLF (Common Log Format, used by almost all web servers).
- webmitm – HTTP / HTTPS monkey-in-the-middle. transparently proxies and sniffs web traffic redirected by dnsspoof, capturing most “secure” SSL-encrypted webmail logins and form submissions.
- webspy – sends URLs sniffed from a client to your local browser for display.
Website: github.com/tecknicaltom/dsniff
Support:
Developer: Dug Song
License: Freely distributable
dsniff is written in C. Learn C with our recommended free books and free tutorials.
Related Software
| Network Analyzers | |
|---|---|
| Wireshark | Network protocol analyzer with a rich and powerful feature set |
| Ettercap | Comprehensive suite for man in the middle attacks |
| Kismet | Wireless network and device detector, sniffer, wardriving tool |
| IPTraf-ng | Feature-laden network statistic monitoring tool |
| netsniff-ng | Swiss army knife for daily Linux network plumbing |
| Kyanos | Networking analysis tool using eBPF |
| EtherApe | Graphical network monitor |
| darkstat | Captures network traffic, calculates usage statistics, and serves reports |
| justniffer | Network TCP packet sniffer with reliable TCP flow rebuilding |
| tcpflow | TCP/IP packet demultiplexer |
| tcpdump | Powerful and hugely respected command-line packet analyzer |
| sniffglue | Packet sniffer written in Rust |
| sniffer | Alternative network traffic sniffer |
| dsniff | Collection of tools for network auditing and penetration testing |
| ngrep | grep applied to the network layer |
| Network Monitor | Rreal-time network connection monitoring tool |
| sniffit | CORBA based sniffer system with ncurses interactive mode |
| Jomon | Network forensics and sniffer tool |
Read our verdict in the software roundup.
Explore our comprehensive directory of recommended free and open source software. Our carefully curated collection spans every major software category.This directory is part of our ongoing series of informative articles for Linux enthusiasts. It features hundreds of detailed reviews, along with open source alternatives to proprietary solutions from major corporations such as Google, Microsoft, Apple, Adobe, IBM, Cisco, Oracle, and Autodesk. You’ll also find interesting projects to try, hardware coverage, free programming books and tutorials, and much more. Discovered a useful open source Linux program that we haven’t covered yet? Let us know by completing this form. |

