This is a simple tool to analyse HTTP cookies. It is written in Python.
-
cookie-scraper.py- This is the main script. It is used to scrape cookies from a website using the Selenium library. It reads URLs fromURLS.txtand stores the cookies incookie-db.xlsx. -
cookie-using-requests.py- This script is used to scrape cookies from a website using the requests module and just prints them. [Deprecated] -
tls-version-checker.py- This script is used to check the TLS version of a website. It reads URLs fromURLS.txtand prints the TLS version of each website. -
ARP_Spoofer.py- This script is an attempted demo ARP Spoof attack from one host in IITGN network to a victim in the same network. We observed that the basic attack fails possibly due to preventive measures at the DHCP Server or checks configured into the Ethernet switches. More advanced MITM techniques may be needed to make the attack successful. -
Rest of the files are just for testing and are not used in the main code. The
.xlsxfiles are the database of cookies. TheURLS-xx.txtcontains different URLS. Thechromedriver_win32directory is the driver necessary for Selenium to run for thecookie-scraper.pyscript. -
You can take a look at the project report :
ProjectReport_CookieAnalysis.pdf
-
Install the required libraries using
pip install -r requirements.txt. -
Run the
cookie-scraper.pyscript bypython cookie-scraper.py. -
Run the
tls-version-checker.pyscript bysudo python tls-version-checker.py. [ Note: The script needs to run in Linux environment and requirestsharkmodule to be installed. Also, needs to be run as root because it uses thesocketmodule. ] -
Run the
ARP_Spoofer.pyscript bypython ARP_Spoofer.pycommand and check change (or no change) in ARP Table entries usingarp -acommand
- Python 3
- Selenium
- Requests [Deprecated]
- Pandas
- PrettyTable
- Tshark (for
tls-version-checker.py) - Scapy (for
ARP_Spoofer.py)