

Start run DIT with the current settings (args override config file settings) config/dit_config.yaml before running DIT.Įdit the file or use optional command line arguments to override the default configuration.ĭIT needs root privileges and custom iptable rules to work properly. dit.py startĬheck configuration stored in. You can install DIT by simply cloning the repository and installing the dependencies listed in requirements.txt with elevated privileges. InstallationĭIT works with raw sockets and needs to run with root privileges. The tool can be configured via CLI arguments or via a configuration file (./config/dit_config.yaml). DIT can print the decrypted datagram payload to stdout or write it into a logfile. It has been tested and evaluated with OpenSSL and devices from the IKEA TRÅDFRI and Philips Hue series. It can handle PSK-based and certificate-based (RSA + ECC) authentication schemes and has been built and tested on Debian-based Linux operating systems like Ubuntu or Kali Linux.ĭIT has been built to analyze traffic between IoT devices but can intercept any DTLS traffic in a local network. DIT has been built with Python 3.8, utilizes scapy and python-mbedtls to process datagrams and supports a wide variety of cipher suites. To achieve this, the machine DIT is running on has to be put in a MitM position with tools like arpspoof. It can intercept, manipulate and/or suppress DTLS datagrams between two DTLS endpoints. DIT is a MitM proxy tool to intercept DTLS traffic.
