Control Network Traffic with Evil Limiter
An Evil Limiter is a tool with whom you can control the bit rate of any device using the same network of the same Wi-Fi network. It allows you to slow down or even stop the transfer limit of data for them completely.
What you will require?
STEPS 1: Install the Evil Limiter on Linux System
The installation is pretty simple as like other tools simply run the below commands
git clone https://github.com/bitbrute/evillimiter.git
cd evillimiter
python3 setup.py install
STEP 2: Connect to Network
Firstly you need to connect to the Targeted network. Afterward, you can run the Evil Limiter tool by typing evilimiter in a new terminal window. you will see the thing on the terminal:
OK interface: wlan0
OK gateway IP: 192.168.5.1
OK gateway mac: 84:2b:98:c6:24:1a
OK netmask: 255.255.255.0
STEP 3: View the available commands
You can explore the functionality of Evil Limiter by looking through the menu system and checking out the available commands. To do so, type a question mark (?) in the terminal to pull up the help page.
STEP 4: Discover Devices
To find out which devices are connected simply type the command:
scan
To see the other hosts on the network type the command:
hosts
STEP 5: Limit or Block Devices
To block or limit the transfer limit of the devices simply type the command limit and then the host ID of the devices with the what data limit you want to allow for eg: 200kb:
Here is an example of the command:
limit 1,2,3,4,5,6 200kbit
(main) (Host ID) (data limit)
Want to block the type block command and the Host ID
STEP 6: Restore Normal connection
Now that you've caused chaos on the network, it's time to set things back the way they were. Fortunately, doing so is easy. You can choose to either restore devices one by one or run free all to undo any limitations on network devices.
free all
Black Hat Hacker mindset:
A blackhat hacker could throttle the manager's data connection while pretending to call from the utility company to ask if the internet connection has been slow. When the manager finds the internet is indeed slow, the hacker simply asks the best time to send someone over to fix it, giving them a pretext to enter the building and preventing the target calling the real utility company.
NOTE: This is is just for an educational purpose we are not responsible for any illegal use
What you will require?
- A Linux system
- A python3 installed o it
- A network where you want to test
- Permission to test on that network
STEPS 1: Install the Evil Limiter on Linux System
The installation is pretty simple as like other tools simply run the below commands
git clone https://github.com/bitbrute/evillimiter.git
cd evillimiter
python3 setup.py install
STEP 2: Connect to Network
Firstly you need to connect to the Targeted network. Afterward, you can run the Evil Limiter tool by typing evilimiter in a new terminal window. you will see the thing on the terminal:
OK interface: wlan0
OK gateway IP: 192.168.5.1
OK gateway mac: 84:2b:98:c6:24:1a
OK netmask: 255.255.255.0
STEP 3: View the available commands
You can explore the functionality of Evil Limiter by looking through the menu system and checking out the available commands. To do so, type a question mark (?) in the terminal to pull up the help page.
STEP 4: Discover Devices
To find out which devices are connected simply type the command:
scan
To see the other hosts on the network type the command:
hosts
STEP 5: Limit or Block Devices
To block or limit the transfer limit of the devices simply type the command limit and then the host ID of the devices with the what data limit you want to allow for eg: 200kb:
Here is an example of the command:
limit 1,2,3,4,5,6 200kbit
(main) (Host ID) (data limit)
Want to block the type block command and the Host ID
STEP 6: Restore Normal connection
Now that you've caused chaos on the network, it's time to set things back the way they were. Fortunately, doing so is easy. You can choose to either restore devices one by one or run free all to undo any limitations on network devices.
free all
Black Hat Hacker mindset:
A blackhat hacker could throttle the manager's data connection while pretending to call from the utility company to ask if the internet connection has been slow. When the manager finds the internet is indeed slow, the hacker simply asks the best time to send someone over to fix it, giving them a pretext to enter the building and preventing the target calling the real utility company.
NOTE: This is is just for an educational purpose we are not responsible for any illegal use
Comments
Post a Comment