IEC104OnSiteMITMAdversary#
- class wattson.hosts.adversaries.on_site.iec104_on_site_mitm_adversary.IEC104OnSiteMITMAdversary(host_cfg: BaseHostConfig, target_client_cfg: NetworkStackConfig, target_server_cfg: NetworkStackConfig, **kwargs)#
Bases:
OnSiteMitmAdversary
,IEC104OnSiteMITMAttack
A MITM that performs a real ARP-Spoof to change packet-flow behaviour.
Methods
- param host_cfg:
node-id + ip
activate_non_forward_action_logging
Converts Dicts from yaml to respective configs
perform_attack_from_file
Start the thread's activity.
Attributes
action_handler
- __init__(host_cfg: BaseHostConfig, target_client_cfg: NetworkStackConfig, target_server_cfg: NetworkStackConfig, **kwargs)#
- Parameters:
host_cfg (BaseHostConfig) – node-id + ip
target_client_cfg (NetworkStackConfig) – filled with at least victim-client IP
target_server_cfg (NetworkStackConfig) – filled with at least victim-server IP
**kwargs – management_network: str; client_gateway_cfg: NetworkStackConfig; server_gateway_cfg: NetworkStackConfig; xterm: bool; sleep_untiL_attack: int scenario_path: Path action_config: str (Python module with a configure_actions function.) executable: str/Path: (Python) module that is executable executable_only: bool if solely to eexecute executable and then stop goal: AttackGoal (for custom non-standard MITM goal)
- static from_dict(host_cfg: Dict, target_client_ip: str, target_server_cfg: Dict, **kwargs) IEC104OnSiteMITMAdversary #
Converts Dicts from yaml to respective configs
- Parameters:
host_cfg (Dict) – node_id, ip-containing dict
target_client_ip (str) – str
target_server_cfg (Dict) – ip (must), port (optional)
**kwargs – {client,server}_gateway_ip for L3-Hop;
- Returns:
respective IEC104-Adversary
- start()#
Start the thread’s activity.
It must be called at most once per thread object. It arranges for the object’s run() method to be invoked in a separate thread of control.
This method will raise a RuntimeError if called more than once on the same thread object.