Control Network Traffic with Evil Limiter

An Evil Limiter is a tool with whom you can control the bit rate of any device using the same network of the same Wi-Fi network. It allows you to slow down or even stop the transfer limit of data for them completely.

What you will require?


  • A Linux system
  • A python3 installed o it
  • A network where you want to test
  • Permission to test on that network


STEPS 1: Install the Evil Limiter on Linux System

The installation is pretty simple as like other tools simply run the below commands 
 git clone https://github.com/bitbrute/evillimiter.git
 cd evillimiter
 python3 setup.py install

STEP 2: Connect to Network

Firstly you need to connect to the Targeted network. Afterward, you can run the Evil Limiter tool by typing evilimiter in a new terminal window. you will see the thing on the terminal:

OK   interface: wlan0
OK   gateway IP: 192.168.5.1
OK   gateway mac: 84:2b:98:c6:24:1a
OK   netmask: 255.255.255.0

STEP 3: View the available commands 

You can explore the functionality of Evil Limiter by looking through the menu system and checking out the available commands. To do so, type a question mark (?) in the terminal to pull up the help page.

STEP 4: Discover Devices

To find out which devices are connected simply type the command:
scan

To see the other hosts on the network type the command:
hosts

STEP 5: Limit or Block Devices

To block or limit the transfer limit of the devices simply type the command limit and then the host ID of the devices with the what data limit you want to allow for eg: 200kb: 
Here is an example of the command:
limit 1,2,3,4,5,6 200kbit
(main) (Host ID) (data limit)

Want to block the type block command and the Host ID

STEP 6: Restore Normal connection

Now that you've caused chaos on the network, it's time to set things back the way they were. Fortunately, doing so is easy. You can choose to either restore devices one by one or run free all to undo any limitations on network devices.
free all

Black Hat Hacker mindset:
A blackhat hacker could throttle the manager's data connection while pretending to call from the utility company to ask if the internet connection has been slow. When the manager finds the internet is indeed slow, the hacker simply asks the best time to send someone over to fix it, giving them a pretext to enter the building and preventing the target calling the real utility company.

NOTE: This is is just for an educational purpose we are not responsible for any illegal use

Comments

Popular posts from this blog

CAREER TECHNOLOGY CYBER SECURITY INDIA PVT LTD.

Some Dark web Links

Cyber Security Audits