quantumInject it will capture the traffic from a network interface in promiscuous mode, and attempt to inject spoofed responses to selected client requests towards TCP services.
Your program should conform to the following specification:
quantuminject.py [-i interface] [-r regexp] [-d datafile] [-b filter] expression:
-i Listen on network device <interface> (e.g., eth0). If not specified, quantuminject should select a default interface to listen on. The same interface should be used for packet injection.
-r Use regular expression <regexp> to match the request packets for which a response will be spoofed.
-d Read the raw data that will be used as the TCP payload of the spoofed response packet from <datafile>
-b <expression> is a BPF filter that specifies a subset of the traffic to be monitored. This option is useful for targeting a single IP address, a single
+ all Linux OS Platform
+ Python scapy,
git clone https://github.com/zare3/QuantumInject && cd QuantumInject
python quantuminject.py -h
python main.py -h for another expression