{"id":3977,"date":"2015-11-28T02:33:35","date_gmt":"2015-11-27T18:33:35","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3977"},"modified":"2015-11-28T02:33:45","modified_gmt":"2015-11-27T18:33:45","slug":"zarp-network-attack-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/11\/zarp-network-attack-tool\/","title":{"rendered":"Zarp – Network Attack Tool"},"content":{"rendered":"
Zarp is a network attack tool centred around the exploitation of local networks. This does not include system exploitation, but rather abusing networking protocols and stacks to take over, infiltrate, and knock out. Sessions can be managed to quickly poison and sniff multiple systems at once, dumping sensitive information automatically or to the attacker directly.<\/p>\n
<\/p>\n
Various sniffers are included to automatically parse usernames and passwords from various protocols, as well as view HTTP traffic and more. DoS attacks are included to knock out various systems and applications. These tools open up the possibility for very complex attack scenarios on live networks quickly, cleanly, and quietly.<\/p>\n
zarp has around 30+ modules grouped into categories of attack and has multiple functionalities under each group:<\/p>\n
zarp is intended to be as dependency-free as possible. When available, zarp has opted to use pure or native Python implementations over requiring or importing huge libraries. Even as such, zarp requires the following to run:<\/p>\n