Skip to content

Davim09/PacketPlatter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PacketPlatter

PacketPlatter is an exploit of CVE-2025–3329 for restaurant ordering platforms. These often use insecure HTTP over Wi-Fi, making them prone to ARP spoofing. PacketPlatter intercepts device traffic via ARP Spoofing, exposing unencrypted data like login credentials and cookies for analysis.

Article PoC

Requirements

  • Python 3.x
  • Scapy

Installation

  1. Clone the repository:

    git clone https://github.com/Davim09/PacketPlatter.git
    cd PacketPlatter
  2. Install the dependencies:

    pip install scapy

    Enable IP Forwarding in root, although the exploit itself already does this, it is what ensures that traffic continues flowing:

    echo 1 > /proc/sys/net/ipv4/ip_forward

Usage

  1. Run the script as root:

    sudo python3 packetplatter.py
  2. Follow the instructions in the terminal to enter the network interface, target IPs and MACs, and the output pcap file name.

Example Execution

About

PacketPlatter is an exploit for network systems, focusing on restaurant ordering platforms. These often use insecure HTTP over Wi-Fi, making them prone to ARP spoofing. PacketPlatter intercepts device traffic via ARP Spoofing, exposing unencrypted data like login credentials and cookies for analysis.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages