“You will learn more from your failures than your successes - so embrace those mistakes, as difficult as that sounds, and grow from them. When a project is successful, you're never really sure why, because so many elements come into play. However, when you fail, you always know why. That is how you learn and grow..” – Lynda Resnick

From the year 1986 network sniffers were introduced to our era of computing. It helped system administrators to investigate and gain better knowledge of networks they were working on. The main reason why packet sniffers are used is to diagnose underlying problems on the network by analyzing network traffic. The functionality of packet sniffer is simply that it monitors traffic and presents results in a human readable format.

However, my goal was to produce a tool that was never seen before by implementing elements of packet sniffing and allow user to perform layer 2 (OSI model) attacks. I can strongly say that I have succeeded and not only that but more than I have expected. This tool is targeted to anyone who has passion in networking and cyber security fields.


Special thanks to my fourth year project supervisor
Paul Barry MSc
for his continuous support and motivation throughout the year.

Quick Demo Video

Below video will show a quick overview of the tool that I created as part my fourth year final project

Functionality Implemented

All below functionality is implemented, was tested and performs described tasks as intended

Operational network packet sniffer
Simple point and click interface
Ability to ARP poison chosen target
Identify hosts on a network
Filter options on a sniffer
Application works on multiple platforms (OSX, Linux, Windows)
Sniffer translates to domain names
Local database to retain queries
Scan for opened ports on a given target
Export capture files in pcap format
Import capture files in pcap format
Displays packet information including binary format
Ability to perform Denial of Service attack (DoS)
Identify if host is active
Perform DHCP starvation attack
Visual representation of packet captures (Bar and Pie charts)


Below technologies were used to implement Network Analyser project

Pthon 3.9.0 Link
Doxygen Link
SQLite3 Link
GitLab Link
Scapy Link
PyQt Link


Research Manual

Contains initial research conducted for my final year project.

Functional Specification

This document outlines the functional specification and project plan.

Final Report

This document contains the full detail with examples of my final year project.


Second presentation that I demonstrated to all project supervisors.



Application Documentation
Doxygen documents

Documentation that describes each of the functions and used variables in a html format.

Source Code
GitLab link

GitLab link that will allow to view and download Network Analyser source code.



My name is Erlandas Bacauskas and I am a fourth year student studying CyberCrime and IT Security in IT Carlow. Cyber crime and security has been my passion for many year's and I hope you enjoy looking at my work as much as I enjoyed doing it.